Oct  2 20:38:43.116194 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1]
Oct  2 20:38:43.116212 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023
Oct  2 20:38:43.116225 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '')
Oct  2 20:38:43.116233 kernel: printk: bootconsole [pl11] enabled
Oct  2 20:38:43.116237 kernel: efi: EFI v2.70 by EDK II
Oct  2 20:38:43.116243 kernel: efi: ACPI 2.0=0x3fd8d018 SMBIOS=0x3fd6a000 SMBIOS 3.0=0x3fd68000 MEMATTR=0x3ef3f098 RNG=0x3fd8d998 MEMRESERVE=0x37eb7f98 
Oct  2 20:38:43.116249 kernel: random: crng init done
Oct  2 20:38:43.116259 kernel: ACPI: Early table checksum verification disabled
Oct  2 20:38:43.116264 kernel: ACPI: RSDP 0x000000003FD8D018 000024 (v02 VRTUAL)
Oct  2 20:38:43.116270 kernel: ACPI: XSDT 0x000000003FD8DF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116275 kernel: ACPI: FACP 0x000000003FD8DC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116281 kernel: ACPI: DSDT 0x000000003EBD6018 01DEC0 (v02 MSFTVM DSDT01   00000001 MSFT 05000000)
Oct  2 20:38:43.116287 kernel: ACPI: DBG2 0x000000003FD8DB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116297 kernel: ACPI: GTDT 0x000000003FD8DD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116303 kernel: ACPI: OEM0 0x000000003FD8D098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116309 kernel: ACPI: SPCR 0x000000003FD8DA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116315 kernel: ACPI: APIC 0x000000003FD8D818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116327 kernel: ACPI: SRAT 0x000000003FD8D198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116333 kernel: ACPI: PPTT 0x000000003FD8D418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000)
Oct  2 20:38:43.116339 kernel: ACPI: BGRT 0x000000003FD8DE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001)
Oct  2 20:38:43.116344 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200
Oct  2 20:38:43.116354 kernel: NUMA: Failed to initialise from firmware
Oct  2 20:38:43.116360 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff]
Oct  2 20:38:43.116365 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff]
Oct  2 20:38:43.116371 kernel: Zone ranges:
Oct  2 20:38:43.116381 kernel:   DMA      [mem 0x0000000000000000-0x00000000ffffffff]
Oct  2 20:38:43.116387 kernel:   DMA32    empty
Oct  2 20:38:43.116393 kernel:   Normal   [mem 0x0000000100000000-0x00000001bfffffff]
Oct  2 20:38:43.116399 kernel: Movable zone start for each node
Oct  2 20:38:43.116405 kernel: Early memory node ranges
Oct  2 20:38:43.116414 kernel:   node   0: [mem 0x0000000000000000-0x00000000007fffff]
Oct  2 20:38:43.116420 kernel:   node   0: [mem 0x0000000000824000-0x000000003ec84fff]
Oct  2 20:38:43.116426 kernel:   node   0: [mem 0x000000003ec85000-0x000000003ecadfff]
Oct  2 20:38:43.116432 kernel:   node   0: [mem 0x000000003ecae000-0x000000003fd2dfff]
Oct  2 20:38:43.116438 kernel:   node   0: [mem 0x000000003fd2e000-0x000000003fd81fff]
Oct  2 20:38:43.116444 kernel:   node   0: [mem 0x000000003fd82000-0x000000003fd8dfff]
Oct  2 20:38:43.116454 kernel:   node   0: [mem 0x000000003fd8e000-0x000000003fd91fff]
Oct  2 20:38:43.116460 kernel:   node   0: [mem 0x000000003fd92000-0x000000003fffffff]
Oct  2 20:38:43.116466 kernel:   node   0: [mem 0x0000000100000000-0x00000001bfffffff]
Oct  2 20:38:43.116473 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff]
Oct  2 20:38:43.116485 kernel: On node 0, zone DMA: 36 pages in unavailable ranges
Oct  2 20:38:43.116492 kernel: psci: probing for conduit method from ACPI.
Oct  2 20:38:43.116498 kernel: psci: PSCIv1.1 detected in firmware.
Oct  2 20:38:43.116505 kernel: psci: Using standard PSCI v0.2 function IDs
Oct  2 20:38:43.116516 kernel: psci: MIGRATE_INFO_TYPE not supported.
Oct  2 20:38:43.116522 kernel: psci: SMC Calling Convention v1.4
Oct  2 20:38:43.116528 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1
Oct  2 20:38:43.116539 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1
Oct  2 20:38:43.116545 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784
Oct  2 20:38:43.116552 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096
Oct  2 20:38:43.116558 kernel: pcpu-alloc: [0] 0 [0] 1 
Oct  2 20:38:43.116568 kernel: Detected PIPT I-cache on CPU0
Oct  2 20:38:43.116574 kernel: CPU features: detected: GIC system register CPU interface
Oct  2 20:38:43.116580 kernel: CPU features: detected: Hardware dirty bit management
Oct  2 20:38:43.116586 kernel: CPU features: detected: Spectre-BHB
Oct  2 20:38:43.116592 kernel: CPU features: kernel page table isolation forced ON by KASLR
Oct  2 20:38:43.116600 kernel: CPU features: detected: Kernel page table isolation (KPTI)
Oct  2 20:38:43.116606 kernel: CPU features: detected: ARM erratum 1418040
Oct  2 20:38:43.116612 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion)
Oct  2 20:38:43.116618 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 1032156
Oct  2 20:38:43.116624 kernel: Policy zone: Normal
Oct  2 20:38:43.116631 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca
Oct  2 20:38:43.116638 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Oct  2 20:38:43.116644 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Oct  2 20:38:43.116650 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Oct  2 20:38:43.116656 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Oct  2 20:38:43.116664 kernel: software IO TLB: mapped [mem 0x000000003abd6000-0x000000003ebd6000] (64MB)
Oct  2 20:38:43.116670 kernel: Memory: 3992064K/4194160K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 202096K reserved, 0K cma-reserved)
Oct  2 20:38:43.116676 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Oct  2 20:38:43.116682 kernel: trace event string verifier disabled
Oct  2 20:38:43.116688 kernel: rcu: Preemptible hierarchical RCU implementation.
Oct  2 20:38:43.116695 kernel: rcu:         RCU event tracing is enabled.
Oct  2 20:38:43.116701 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Oct  2 20:38:43.116707 kernel:         Trampoline variant of Tasks RCU enabled.
Oct  2 20:38:43.116713 kernel:         Tracing variant of Tasks RCU enabled.
Oct  2 20:38:43.116719 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct  2 20:38:43.116725 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Oct  2 20:38:43.116733 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Oct  2 20:38:43.116739 kernel: GICv3: 960 SPIs implemented
Oct  2 20:38:43.116745 kernel: GICv3: 0 Extended SPIs implemented
Oct  2 20:38:43.121959 kernel: GICv3: Distributor has no Range Selector support
Oct  2 20:38:43.121979 kernel: Root IRQ handler: gic_handle_irq
Oct  2 20:38:43.121985 kernel: GICv3: 16 PPIs implemented
Oct  2 20:38:43.121991 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000
Oct  2 20:38:43.121997 kernel: ITS: No ITS available, not enabling LPIs
Oct  2 20:38:43.122004 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Oct  2 20:38:43.122010 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt).
Oct  2 20:38:43.122016 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns
Oct  2 20:38:43.122023 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns
Oct  2 20:38:43.122034 kernel: Console: colour dummy device 80x25
Oct  2 20:38:43.122040 kernel: printk: console [tty1] enabled
Oct  2 20:38:43.122047 kernel: ACPI: Core revision 20210730
Oct  2 20:38:43.122053 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000)
Oct  2 20:38:43.122060 kernel: pid_max: default: 32768 minimum: 301
Oct  2 20:38:43.122066 kernel: LSM: Security Framework initializing
Oct  2 20:38:43.122072 kernel: SELinux:  Initializing.
Oct  2 20:38:43.122079 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Oct  2 20:38:43.122085 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Oct  2 20:38:43.122093 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1
Oct  2 20:38:43.122099 kernel: Hyper-V: Host Build 10.0.22477.1341-1-0
Oct  2 20:38:43.122105 kernel: rcu: Hierarchical SRCU implementation.
Oct  2 20:38:43.122111 kernel: Remapping and enabling EFI services.
Oct  2 20:38:43.122118 kernel: smp: Bringing up secondary CPUs ...
Oct  2 20:38:43.122124 kernel: Detected PIPT I-cache on CPU1
Oct  2 20:38:43.122130 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000
Oct  2 20:38:43.122136 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Oct  2 20:38:43.122143 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1]
Oct  2 20:38:43.122150 kernel: smp: Brought up 1 node, 2 CPUs
Oct  2 20:38:43.122156 kernel: SMP: Total of 2 processors activated.
Oct  2 20:38:43.122163 kernel: CPU features: detected: 32-bit EL0 Support
Oct  2 20:38:43.122169 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence
Oct  2 20:38:43.122176 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence
Oct  2 20:38:43.122182 kernel: CPU features: detected: CRC32 instructions
Oct  2 20:38:43.122188 kernel: CPU features: detected: RCpc load-acquire (LDAPR)
Oct  2 20:38:43.122194 kernel: CPU features: detected: LSE atomic instructions
Oct  2 20:38:43.122200 kernel: CPU features: detected: Privileged Access Never
Oct  2 20:38:43.122208 kernel: CPU: All CPU(s) started at EL1
Oct  2 20:38:43.122214 kernel: alternatives: patching kernel code
Oct  2 20:38:43.122225 kernel: devtmpfs: initialized
Oct  2 20:38:43.122232 kernel: KASLR enabled
Oct  2 20:38:43.122239 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct  2 20:38:43.122246 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Oct  2 20:38:43.122252 kernel: pinctrl core: initialized pinctrl subsystem
Oct  2 20:38:43.122259 kernel: SMBIOS 3.1.0 present.
Oct  2 20:38:43.122265 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/16/2022
Oct  2 20:38:43.122272 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Oct  2 20:38:43.122280 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
Oct  2 20:38:43.122286 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Oct  2 20:38:43.122293 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Oct  2 20:38:43.122300 kernel: audit: initializing netlink subsys (disabled)
Oct  2 20:38:43.122307 kernel: audit: type=2000 audit(0.092:1): state=initialized audit_enabled=0 res=1
Oct  2 20:38:43.122313 kernel: thermal_sys: Registered thermal governor 'step_wise'
Oct  2 20:38:43.122319 kernel: cpuidle: using governor menu
Oct  2 20:38:43.122327 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Oct  2 20:38:43.122334 kernel: ASID allocator initialised with 32768 entries
Oct  2 20:38:43.122340 kernel: ACPI: bus type PCI registered
Oct  2 20:38:43.122347 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct  2 20:38:43.122353 kernel: Serial: AMBA PL011 UART driver
Oct  2 20:38:43.122360 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct  2 20:38:43.122367 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages
Oct  2 20:38:43.122373 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct  2 20:38:43.122380 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages
Oct  2 20:38:43.122387 kernel: cryptd: max_cpu_qlen set to 1000
Oct  2 20:38:43.122394 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng)
Oct  2 20:38:43.122400 kernel: ACPI: Added _OSI(Module Device)
Oct  2 20:38:43.122407 kernel: ACPI: Added _OSI(Processor Device)
Oct  2 20:38:43.122414 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct  2 20:38:43.122420 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct  2 20:38:43.122427 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct  2 20:38:43.122433 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct  2 20:38:43.122440 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct  2 20:38:43.122448 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Oct  2 20:38:43.122455 kernel: ACPI: Interpreter enabled
Oct  2 20:38:43.122461 kernel: ACPI: Using GIC for interrupt routing
Oct  2 20:38:43.122468 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA
Oct  2 20:38:43.122474 kernel: printk: console [ttyAMA0] enabled
Oct  2 20:38:43.122481 kernel: printk: bootconsole [pl11] disabled
Oct  2 20:38:43.122488 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA
Oct  2 20:38:43.122494 kernel: iommu: Default domain type: Translated 
Oct  2 20:38:43.122501 kernel: iommu: DMA domain TLB invalidation policy: strict mode 
Oct  2 20:38:43.122508 kernel: vgaarb: loaded
Oct  2 20:38:43.122515 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct  2 20:38:43.122522 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct  2 20:38:43.122528 kernel: PTP clock support registered
Oct  2 20:38:43.122535 kernel: Registered efivars operations
Oct  2 20:38:43.122541 kernel: No ACPI PMU IRQ for CPU0
Oct  2 20:38:43.122548 kernel: No ACPI PMU IRQ for CPU1
Oct  2 20:38:43.122554 kernel: clocksource: Switched to clocksource arch_sys_counter
Oct  2 20:38:43.122561 kernel: VFS: Disk quotas dquot_6.6.0
Oct  2 20:38:43.122569 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct  2 20:38:43.122575 kernel: pnp: PnP ACPI init
Oct  2 20:38:43.122582 kernel: pnp: PnP ACPI: found 0 devices
Oct  2 20:38:43.122588 kernel: NET: Registered PF_INET protocol family
Oct  2 20:38:43.122595 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
Oct  2 20:38:43.122601 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Oct  2 20:38:43.122608 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Oct  2 20:38:43.122615 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Oct  2 20:38:43.122621 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Oct  2 20:38:43.122631 kernel: TCP: Hash tables configured (established 32768 bind 32768)
Oct  2 20:38:43.122638 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Oct  2 20:38:43.122644 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Oct  2 20:38:43.122651 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Oct  2 20:38:43.122657 kernel: PCI: CLS 0 bytes, default 64
Oct  2 20:38:43.122664 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available
Oct  2 20:38:43.122671 kernel: kvm [1]: HYP mode not available
Oct  2 20:38:43.122677 kernel: Initialise system trusted keyrings
Oct  2 20:38:43.122684 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0
Oct  2 20:38:43.122692 kernel: Key type asymmetric registered
Oct  2 20:38:43.122698 kernel: Asymmetric key parser 'x509' registered
Oct  2 20:38:43.122705 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Oct  2 20:38:43.122711 kernel: io scheduler mq-deadline registered
Oct  2 20:38:43.122718 kernel: io scheduler kyber registered
Oct  2 20:38:43.122724 kernel: io scheduler bfq registered
Oct  2 20:38:43.122731 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct  2 20:38:43.122737 kernel: thunder_xcv, ver 1.0
Oct  2 20:38:43.122743 kernel: thunder_bgx, ver 1.0
Oct  2 20:38:43.122764 kernel: nicpf, ver 1.0
Oct  2 20:38:43.122771 kernel: nicvf, ver 1.0
Oct  2 20:38:43.122956 kernel: rtc-efi rtc-efi.0: registered as rtc0
Oct  2 20:38:43.123017 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T20:38:42 UTC (1696279122)
Oct  2 20:38:43.123027 kernel: efifb: probing for efifb
Oct  2 20:38:43.123034 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k
Oct  2 20:38:43.123041 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1
Oct  2 20:38:43.123047 kernel: efifb: scrolling: redraw
Oct  2 20:38:43.123056 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Oct  2 20:38:43.123063 kernel: Console: switching to colour frame buffer device 128x48
Oct  2 20:38:43.123069 kernel: fb0: EFI VGA frame buffer device
Oct  2 20:38:43.123076 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping ....
Oct  2 20:38:43.123082 kernel: hid: raw HID events driver (C) Jiri Kosina
Oct  2 20:38:43.123089 kernel: NET: Registered PF_INET6 protocol family
Oct  2 20:38:43.123096 kernel: Segment Routing with IPv6
Oct  2 20:38:43.123102 kernel: In-situ OAM (IOAM) with IPv6
Oct  2 20:38:43.123108 kernel: NET: Registered PF_PACKET protocol family
Oct  2 20:38:43.123116 kernel: Key type dns_resolver registered
Oct  2 20:38:43.123123 kernel: registered taskstats version 1
Oct  2 20:38:43.123130 kernel: Loading compiled-in X.509 certificates
Oct  2 20:38:43.123137 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d'
Oct  2 20:38:43.123143 kernel: Key type .fscrypt registered
Oct  2 20:38:43.123150 kernel: Key type fscrypt-provisioning registered
Oct  2 20:38:43.123156 kernel: ima: No TPM chip found, activating TPM-bypass!
Oct  2 20:38:43.123163 kernel: ima: Allocated hash algorithm: sha1
Oct  2 20:38:43.123169 kernel: ima: No architecture policies found
Oct  2 20:38:43.123177 kernel: Freeing unused kernel memory: 34560K
Oct  2 20:38:43.123183 kernel: Run /init as init process
Oct  2 20:38:43.123190 kernel:   with arguments:
Oct  2 20:38:43.123197 kernel:     /init
Oct  2 20:38:43.123203 kernel:   with environment:
Oct  2 20:38:43.123209 kernel:     HOME=/
Oct  2 20:38:43.123216 kernel:     TERM=linux
Oct  2 20:38:43.123222 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Oct  2 20:38:43.123231 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 20:38:43.123241 systemd[1]: Detected virtualization microsoft.
Oct  2 20:38:43.123248 systemd[1]: Detected architecture arm64.
Oct  2 20:38:43.123255 systemd[1]: Running in initrd.
Oct  2 20:38:43.123262 systemd[1]: No hostname configured, using default hostname.
Oct  2 20:38:43.123268 systemd[1]: Hostname set to <localhost>.
Oct  2 20:38:43.123275 systemd[1]: Initializing machine ID from random generator.
Oct  2 20:38:43.123282 systemd[1]: Queued start job for default target initrd.target.
Oct  2 20:38:43.123290 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 20:38:43.123297 systemd[1]: Reached target cryptsetup.target.
Oct  2 20:38:43.123304 systemd[1]: Reached target paths.target.
Oct  2 20:38:43.123311 systemd[1]: Reached target slices.target.
Oct  2 20:38:43.123318 systemd[1]: Reached target swap.target.
Oct  2 20:38:43.123325 systemd[1]: Reached target timers.target.
Oct  2 20:38:43.123332 systemd[1]: Listening on iscsid.socket.
Oct  2 20:38:43.123339 systemd[1]: Listening on iscsiuio.socket.
Oct  2 20:38:43.123348 systemd[1]: Listening on systemd-journald-audit.socket.
Oct  2 20:38:43.123355 systemd[1]: Listening on systemd-journald-dev-log.socket.
Oct  2 20:38:43.123362 systemd[1]: Listening on systemd-journald.socket.
Oct  2 20:38:43.123369 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 20:38:43.123376 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 20:38:43.123383 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 20:38:43.123390 systemd[1]: Reached target sockets.target.
Oct  2 20:38:43.123397 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 20:38:43.123404 systemd[1]: Finished network-cleanup.service.
Oct  2 20:38:43.123413 systemd[1]: Starting systemd-fsck-usr.service...
Oct  2 20:38:43.123420 systemd[1]: Starting systemd-journald.service...
Oct  2 20:38:43.123427 systemd[1]: Starting systemd-modules-load.service...
Oct  2 20:38:43.123434 systemd[1]: Starting systemd-resolved.service...
Oct  2 20:38:43.123441 systemd[1]: Starting systemd-vconsole-setup.service...
Oct  2 20:38:43.123452 systemd-journald[276]: Journal started
Oct  2 20:38:43.123493 systemd-journald[276]: Runtime Journal (/run/log/journal/cb59c43ea1864ff0a4c6e428d58f6429) is 8.0M, max 78.6M, 70.6M free.
Oct  2 20:38:43.123874 systemd-modules-load[277]: Inserted module 'overlay'
Oct  2 20:38:43.138245 systemd[1]: Started systemd-journald.service.
Oct  2 20:38:43.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.161630 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 20:38:43.198919 kernel: audit: type=1130 audit(1696279123.144:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.198943 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Oct  2 20:38:43.198952 kernel: audit: type=1130 audit(1696279123.177:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.198961 kernel: Bridge firewalling registered
Oct  2 20:38:43.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.167416 systemd-resolved[278]: Positive Trust Anchors:
Oct  2 20:38:43.167424 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 20:38:43.239816 kernel: audit: type=1130 audit(1696279123.219:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.239840 kernel: SCSI subsystem initialized
Oct  2 20:38:43.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.167451 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 20:38:43.170644 systemd-resolved[278]: Defaulting to hostname 'linux'.
Oct  2 20:38:43.363862 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Oct  2 20:38:43.363887 kernel: device-mapper: uevent: version 1.0.3
Oct  2 20:38:43.363896 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Oct  2 20:38:43.363905 kernel: audit: type=1130 audit(1696279123.298:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.363915 kernel: audit: type=1130 audit(1696279123.320:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.363924 kernel: audit: type=1130 audit(1696279123.344:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.198556 systemd[1]: Started systemd-resolved.service.
Oct  2 20:38:43.202395 systemd-modules-load[277]: Inserted module 'br_netfilter'
Oct  2 20:38:43.236190 systemd[1]: Finished systemd-fsck-usr.service.
Oct  2 20:38:43.299875 systemd-modules-load[277]: Inserted module 'dm_multipath'
Oct  2 20:38:43.299936 systemd[1]: Finished systemd-vconsole-setup.service.
Oct  2 20:38:43.321339 systemd[1]: Finished systemd-modules-load.service.
Oct  2 20:38:43.345926 systemd[1]: Reached target nss-lookup.target.
Oct  2 20:38:43.373072 systemd[1]: Starting dracut-cmdline-ask.service...
Oct  2 20:38:43.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.386274 systemd[1]: Starting systemd-sysctl.service...
Oct  2 20:38:43.463382 kernel: audit: type=1130 audit(1696279123.434:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.409527 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 20:38:43.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.430677 systemd[1]: Finished dracut-cmdline-ask.service.
Oct  2 20:38:43.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.457659 systemd[1]: Finished systemd-sysctl.service.
Oct  2 20:38:43.527664 kernel: audit: type=1130 audit(1696279123.467:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.527688 kernel: audit: type=1130 audit(1696279123.495:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.468415 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 20:38:43.499899 systemd[1]: Starting dracut-cmdline.service...
Oct  2 20:38:43.544828 dracut-cmdline[298]: dracut-dracut-053
Oct  2 20:38:43.551164 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca
Oct  2 20:38:43.690781 kernel: Loading iSCSI transport class v2.0-870.
Oct  2 20:38:43.701766 kernel: iscsi: registered transport (tcp)
Oct  2 20:38:43.720774 kernel: iscsi: registered transport (qla4xxx)
Oct  2 20:38:43.720823 kernel: QLogic iSCSI HBA Driver
Oct  2 20:38:43.813512 systemd[1]: Finished dracut-cmdline.service.
Oct  2 20:38:43.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:43.821105 systemd[1]: Starting dracut-pre-udev.service...
Oct  2 20:38:43.890784 kernel: raid6: neonx8   gen() 13810 MB/s
Oct  2 20:38:43.910776 kernel: raid6: neonx8   xor() 10824 MB/s
Oct  2 20:38:43.930769 kernel: raid6: neonx4   gen() 13513 MB/s
Oct  2 20:38:43.951764 kernel: raid6: neonx4   xor() 11299 MB/s
Oct  2 20:38:43.973764 kernel: raid6: neonx2   gen() 12922 MB/s
Oct  2 20:38:43.994787 kernel: raid6: neonx2   xor() 10246 MB/s
Oct  2 20:38:44.016778 kernel: raid6: neonx1   gen() 10508 MB/s
Oct  2 20:38:44.036779 kernel: raid6: neonx1   xor()  8791 MB/s
Oct  2 20:38:44.056783 kernel: raid6: int64x8  gen()  6292 MB/s
Oct  2 20:38:44.078773 kernel: raid6: int64x8  xor()  3547 MB/s
Oct  2 20:38:44.098792 kernel: raid6: int64x4  gen()  7262 MB/s
Oct  2 20:38:44.118779 kernel: raid6: int64x4  xor()  3851 MB/s
Oct  2 20:38:44.139775 kernel: raid6: int64x2  gen()  6149 MB/s
Oct  2 20:38:44.160766 kernel: raid6: int64x2  xor()  3326 MB/s
Oct  2 20:38:44.180774 kernel: raid6: int64x1  gen()  5046 MB/s
Oct  2 20:38:44.209243 kernel: raid6: int64x1  xor()  2646 MB/s
Oct  2 20:38:44.209261 kernel: raid6: using algorithm neonx8 gen() 13810 MB/s
Oct  2 20:38:44.209270 kernel: raid6: .... xor() 10824 MB/s, rmw enabled
Oct  2 20:38:44.213515 kernel: raid6: using neon recovery algorithm
Oct  2 20:38:44.232767 kernel: xor: measuring software checksum speed
Oct  2 20:38:44.241400 kernel:    8regs           : 17297 MB/sec
Oct  2 20:38:44.241412 kernel:    32regs          : 20770 MB/sec
Oct  2 20:38:44.241764 kernel:    arm64_neon      : 27835 MB/sec
Oct  2 20:38:44.250198 kernel: xor: using function: arm64_neon (27835 MB/sec)
Oct  2 20:38:44.306791 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no
Oct  2 20:38:44.326734 systemd[1]: Finished dracut-pre-udev.service.
Oct  2 20:38:44.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:44.336000 audit: BPF prog-id=7 op=LOAD
Oct  2 20:38:44.336000 audit: BPF prog-id=8 op=LOAD
Oct  2 20:38:44.336741 systemd[1]: Starting systemd-udevd.service...
Oct  2 20:38:44.360187 systemd-udevd[474]: Using default interface naming scheme 'v252'.
Oct  2 20:38:44.367362 systemd[1]: Started systemd-udevd.service.
Oct  2 20:38:44.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:44.381228 systemd[1]: Starting dracut-pre-trigger.service...
Oct  2 20:38:44.418331 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation
Oct  2 20:38:44.473803 systemd[1]: Finished dracut-pre-trigger.service.
Oct  2 20:38:44.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:44.479710 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 20:38:44.525532 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 20:38:44.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:44.603015 kernel: hv_vmbus: Vmbus version:5.3
Oct  2 20:38:44.609784 kernel: hv_vmbus: registering driver hid_hyperv
Oct  2 20:38:44.622835 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0
Oct  2 20:38:44.622883 kernel: hv_vmbus: registering driver hyperv_keyboard
Oct  2 20:38:44.622893 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on 
Oct  2 20:38:44.650777 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1
Oct  2 20:38:44.650831 kernel: hv_vmbus: registering driver hv_netvsc
Oct  2 20:38:44.656787 kernel: hv_vmbus: registering driver hv_storvsc
Oct  2 20:38:44.664880 kernel: scsi host1: storvsc_host_t
Oct  2 20:38:44.665086 kernel: scsi host0: storvsc_host_t
Oct  2 20:38:44.672157 kernel: scsi 0:0:0:0: Direct-Access     Msft     Virtual Disk     1.0  PQ: 0 ANSI: 5
Oct  2 20:38:44.679211 kernel: scsi 0:0:0:2: CD-ROM            Msft     Virtual DVD-ROM  1.0  PQ: 0 ANSI: 0
Oct  2 20:38:44.697185 kernel: sr 0:0:0:2: [sr0] scsi-1 drive
Oct  2 20:38:44.697403 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20
Oct  2 20:38:44.707926 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB)
Oct  2 20:38:44.708115 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Oct  2 20:38:44.712170 kernel: sd 0:0:0:0: [sda] Write Protect is off
Oct  2 20:38:44.712314 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0
Oct  2 20:38:44.719172 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00
Oct  2 20:38:44.719303 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA
Oct  2 20:38:44.724770 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 20:38:44.729765 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Oct  2 20:38:44.848774 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (539)
Oct  2 20:38:44.848864 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Oct  2 20:38:44.880245 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 20:38:44.904797 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Oct  2 20:38:44.917250 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Oct  2 20:38:44.937103 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Oct  2 20:38:44.943328 systemd[1]: Starting disk-uuid.service...
Oct  2 20:38:44.968792 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 20:38:45.989368 disk-uuid[592]: The operation has completed successfully.
Oct  2 20:38:45.994661 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 20:38:46.059982 systemd[1]: disk-uuid.service: Deactivated successfully.
Oct  2 20:38:46.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.060071 systemd[1]: Finished disk-uuid.service.
Oct  2 20:38:46.074435 systemd[1]: Starting verity-setup.service...
Oct  2 20:38:46.105778 kernel: device-mapper: verity: sha256 using implementation "sha256-ce"
Oct  2 20:38:46.211013 systemd[1]: Found device dev-mapper-usr.device.
Oct  2 20:38:46.218716 systemd[1]: Mounting sysusr-usr.mount...
Oct  2 20:38:46.233353 systemd[1]: Finished verity-setup.service.
Oct  2 20:38:46.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.288776 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Oct  2 20:38:46.289102 systemd[1]: Mounted sysusr-usr.mount.
Oct  2 20:38:46.293166 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Oct  2 20:38:46.293952 systemd[1]: Starting ignition-setup.service...
Oct  2 20:38:46.301745 systemd[1]: Starting parse-ip-for-networkd.service...
Oct  2 20:38:46.349025 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm
Oct  2 20:38:46.349079 kernel: BTRFS info (device sda6): using free space tree
Oct  2 20:38:46.354224 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 20:38:46.417051 systemd[1]: mnt-oem.mount: Deactivated successfully.
Oct  2 20:38:46.492292 systemd[1]: Finished ignition-setup.service.
Oct  2 20:38:46.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.498029 systemd[1]: Starting ignition-fetch-offline.service...
Oct  2 20:38:46.528049 systemd[1]: Finished parse-ip-for-networkd.service.
Oct  2 20:38:46.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.537000 audit: BPF prog-id=9 op=LOAD
Oct  2 20:38:46.538483 systemd[1]: Starting systemd-networkd.service...
Oct  2 20:38:46.567724 systemd-networkd[866]: lo: Link UP
Oct  2 20:38:46.578928 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 20:38:46.567740 systemd-networkd[866]: lo: Gained carrier
Oct  2 20:38:46.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.568144 systemd-networkd[866]: Enumeration completed
Oct  2 20:38:46.568448 systemd-networkd[866]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 20:38:46.577062 systemd[1]: Started systemd-networkd.service.
Oct  2 20:38:46.578281 systemd-networkd[866]: eth0: Link UP
Oct  2 20:38:46.578422 systemd-networkd[866]: eth0: Gained carrier
Oct  2 20:38:46.583657 systemd[1]: Reached target network.target.
Oct  2 20:38:46.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.609342 systemd[1]: Starting iscsiuio.service...
Oct  2 20:38:46.610116 systemd-networkd[866]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16
Oct  2 20:38:46.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.625884 systemd[1]: Started iscsiuio.service.
Oct  2 20:38:46.670961 iscsid[871]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 20:38:46.670961 iscsid[871]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log
Oct  2 20:38:46.670961 iscsid[871]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Oct  2 20:38:46.670961 iscsid[871]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Oct  2 20:38:46.670961 iscsid[871]: If using hardware iscsi like qla4xxx this message can be ignored.
Oct  2 20:38:46.670961 iscsid[871]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 20:38:46.670961 iscsid[871]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Oct  2 20:38:46.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.639146 systemd[1]: Starting iscsid.service...
Oct  2 20:38:46.656122 systemd[1]: Started iscsid.service.
Oct  2 20:38:46.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:46.662103 systemd[1]: Starting dracut-initqueue.service...
Oct  2 20:38:46.698164 systemd[1]: Finished dracut-initqueue.service.
Oct  2 20:38:46.703646 systemd[1]: Reached target remote-fs-pre.target.
Oct  2 20:38:46.708829 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 20:38:46.727283 systemd[1]: Reached target remote-fs.target.
Oct  2 20:38:46.732566 systemd[1]: Starting dracut-pre-mount.service...
Oct  2 20:38:46.768230 systemd[1]: Finished dracut-pre-mount.service.
Oct  2 20:38:47.489058 ignition[856]: Ignition 2.14.0
Oct  2 20:38:47.492500 ignition[856]: Stage: fetch-offline
Oct  2 20:38:47.492596 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:47.492632 ignition[856]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:47.533022 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:47.533225 ignition[856]: parsed url from cmdline: ""
Oct  2 20:38:47.533228 ignition[856]: no config URL provided
Oct  2 20:38:47.533234 ignition[856]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 20:38:47.533245 ignition[856]: no config at "/usr/lib/ignition/user.ign"
Oct  2 20:38:47.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.547517 systemd[1]: Finished ignition-fetch-offline.service.
Oct  2 20:38:47.595273 kernel: kauditd_printk_skb: 18 callbacks suppressed
Oct  2 20:38:47.595297 kernel: audit: type=1130 audit(1696279127.556:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.533252 ignition[856]: failed to fetch config: resource requires networking
Oct  2 20:38:47.571655 systemd[1]: Starting ignition-fetch.service...
Oct  2 20:38:47.533537 ignition[856]: Ignition finished successfully
Oct  2 20:38:47.586485 ignition[890]: Ignition 2.14.0
Oct  2 20:38:47.586492 ignition[890]: Stage: fetch
Oct  2 20:38:47.586610 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:47.586638 ignition[890]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:47.601063 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:47.601556 ignition[890]: parsed url from cmdline: ""
Oct  2 20:38:47.601560 ignition[890]: no config URL provided
Oct  2 20:38:47.601566 ignition[890]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 20:38:47.601578 ignition[890]: no config at "/usr/lib/ignition/user.ign"
Oct  2 20:38:47.601628 ignition[890]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1
Oct  2 20:38:47.628039 ignition[890]: GET result: OK
Oct  2 20:38:47.628177 ignition[890]: config has been read from IMDS userdata
Oct  2 20:38:47.628231 ignition[890]: parsing config with SHA512: d8c1abe9bbd89539dd7d5e6eb867414b91549600a4a7851401f7980eb989303166968fa90eb65ad172be6b0b6eb60616ccbc43423ee7b4c2cd377f9f8616ac9e
Oct  2 20:38:47.665601 unknown[890]: fetched base config from "system"
Oct  2 20:38:47.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.666118 ignition[890]: fetch: fetch complete
Oct  2 20:38:47.701200 kernel: audit: type=1130 audit(1696279127.674:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.665609 unknown[890]: fetched base config from "system"
Oct  2 20:38:47.666123 ignition[890]: fetch: fetch passed
Oct  2 20:38:47.665614 unknown[890]: fetched user config from "azure"
Oct  2 20:38:47.666168 ignition[890]: Ignition finished successfully
Oct  2 20:38:47.670382 systemd[1]: Finished ignition-fetch.service.
Oct  2 20:38:47.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.714911 ignition[896]: Ignition 2.14.0
Oct  2 20:38:47.752450 kernel: audit: type=1130 audit(1696279127.731:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.676230 systemd[1]: Starting ignition-kargs.service...
Oct  2 20:38:47.714918 ignition[896]: Stage: kargs
Oct  2 20:38:47.727013 systemd[1]: Finished ignition-kargs.service.
Oct  2 20:38:47.715038 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:47.715056 ignition[896]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:47.769811 systemd[1]: Starting ignition-disks.service...
Oct  2 20:38:47.718099 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:47.723442 ignition[896]: kargs: kargs passed
Oct  2 20:38:47.723520 ignition[896]: Ignition finished successfully
Oct  2 20:38:47.786304 ignition[902]: Ignition 2.14.0
Oct  2 20:38:47.796242 systemd[1]: Finished ignition-disks.service.
Oct  2 20:38:47.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.786310 ignition[902]: Stage: disks
Oct  2 20:38:47.855801 kernel: audit: type=1130 audit(1696279127.804:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:47.855829 kernel: hv_netvsc 0022487d-4eed-0022-487d-4eed0022487d eth0: VF slot 1 added
Oct  2 20:38:47.855992 kernel: hv_vmbus: registering driver hv_pci
Oct  2 20:38:47.856001 kernel: hv_pci 4ca51fca-2f8e-4e7b-a2ce-2dd34b8f93f7: PCI VMBus probing: Using version 0x10004
Oct  2 20:38:47.786455 ignition[902]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:47.875600 kernel: hv_pci 4ca51fca-2f8e-4e7b-a2ce-2dd34b8f93f7: PCI host bridge to bus 2f8e:00
Oct  2 20:38:47.875786 kernel: pci_bus 2f8e:00: root bus resource [mem 0xfc0000000-0xfc00fffff window]
Oct  2 20:38:47.875891 kernel: pci_bus 2f8e:00: No busn resource found for root bus, will use [bus 00-ff]
Oct  2 20:38:47.824944 systemd[1]: Reached target initrd-root-device.target.
Oct  2 20:38:47.907124 kernel: pci 2f8e:00:02.0: [15b3:1018] type 00 class 0x020000
Oct  2 20:38:47.907177 kernel: pci 2f8e:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref]
Oct  2 20:38:47.786477 ignition[902]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:47.862842 systemd[1]: Reached target local-fs-pre.target.
Oct  2 20:38:47.789636 ignition[902]: no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:47.892278 systemd[1]: Reached target local-fs.target.
Oct  2 20:38:47.794928 ignition[902]: disks: disks passed
Oct  2 20:38:47.918055 systemd[1]: Reached target sysinit.target.
Oct  2 20:38:47.794990 ignition[902]: Ignition finished successfully
Oct  2 20:38:47.928543 systemd[1]: Reached target basic.target.
Oct  2 20:38:48.107153 systemd[1]: Starting systemd-fsck-root.service...
Oct  2 20:38:48.123477 kernel: pci 2f8e:00:02.0: enabling Extended Tags
Oct  2 20:38:48.141826 kernel: pci 2f8e:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 2f8e:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link)
Oct  2 20:38:48.154602 kernel: pci_bus 2f8e:00: busn_res: [bus 00-ff] end is updated to 00
Oct  2 20:38:48.154795 kernel: pci 2f8e:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref]
Oct  2 20:38:48.173739 systemd-fsck[911]: ROOT: clean, 603/7326000 files, 481067/7359488 blocks
Oct  2 20:38:48.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.183642 systemd[1]: Finished systemd-fsck-root.service.
Oct  2 20:38:48.210549 systemd[1]: Mounting sysroot.mount...
Oct  2 20:38:48.217954 kernel: audit: type=1130 audit(1696279128.187:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.224791 kernel: mlx5_core 2f8e:00:02.0: firmware version: 16.31.2424
Oct  2 20:38:48.244782 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Oct  2 20:38:48.246182 systemd[1]: Mounted sysroot.mount.
Oct  2 20:38:48.253541 systemd-networkd[866]: eth0: Gained IPv6LL
Oct  2 20:38:48.258582 systemd[1]: Reached target initrd-root-fs.target.
Oct  2 20:38:48.278781 systemd[1]: Mounting sysroot-usr.mount...
Oct  2 20:38:48.290143 systemd[1]: Starting flatcar-metadata-hostname.service...
Oct  2 20:38:48.306971 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Oct  2 20:38:48.316614 systemd[1]: Reached target ignition-diskful.target.
Oct  2 20:38:48.327792 systemd[1]: Mounted sysroot-usr.mount.
Oct  2 20:38:48.345433 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 20:38:48.356036 systemd[1]: Starting initrd-setup-root.service...
Oct  2 20:38:48.378016 initrd-setup-root[929]: cut: /sysroot/etc/passwd: No such file or directory
Oct  2 20:38:48.390735 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (924)
Oct  2 20:38:48.390764 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm
Oct  2 20:38:48.397400 kernel: BTRFS info (device sda6): using free space tree
Oct  2 20:38:48.402557 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 20:38:48.410261 initrd-setup-root[944]: cut: /sysroot/etc/group: No such file or directory
Oct  2 20:38:48.423786 kernel: mlx5_core 2f8e:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0)
Oct  2 20:38:48.429440 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 20:38:48.441049 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory
Oct  2 20:38:48.451492 initrd-setup-root[977]: cut: /sysroot/etc/gshadow: No such file or directory
Oct  2 20:38:48.552785 kernel: hv_netvsc 0022487d-4eed-0022-487d-4eed0022487d eth0: VF registering: eth1
Oct  2 20:38:48.559779 kernel: mlx5_core 2f8e:00:02.0 eth1: joined to eth0
Oct  2 20:38:48.573895 kernel: mlx5_core 2f8e:00:02.0 enP12174s1: renamed from eth1
Oct  2 20:38:48.577929 systemd-networkd[866]: eth1: Interface name change detected, renamed to enP12174s1.
Oct  2 20:38:48.606656 systemd[1]: Finished initrd-setup-root.service.
Oct  2 20:38:48.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.635376 systemd[1]: Starting ignition-mount.service...
Oct  2 20:38:48.648633 kernel: audit: type=1130 audit(1696279128.611:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.644847 systemd[1]: Starting sysroot-boot.service...
Oct  2 20:38:48.664275 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Oct  2 20:38:48.664384 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Oct  2 20:38:48.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.686561 systemd[1]: Finished sysroot-boot.service.
Oct  2 20:38:48.714339 kernel: audit: type=1130 audit(1696279128.690:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.727711 ignition[1001]: INFO     : Ignition 2.14.0
Oct  2 20:38:48.727711 ignition[1001]: INFO     : Stage: mount
Oct  2 20:38:48.743149 kernel: mlx5_core 2f8e:00:02.0 enP12174s1: Link up
Oct  2 20:38:48.742482 systemd[1]: Finished ignition-mount.service.
Oct  2 20:38:48.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.766687 ignition[1001]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:48.766687 ignition[1001]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:48.766687 ignition[1001]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:48.766687 ignition[1001]: INFO     : mount: mount passed
Oct  2 20:38:48.766687 ignition[1001]: INFO     : Ignition finished successfully
Oct  2 20:38:48.815361 kernel: audit: type=1130 audit(1696279128.747:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.815387 kernel: hv_netvsc 0022487d-4eed-0022-487d-4eed0022487d eth0: Data path switched to VF: enP12174s1
Oct  2 20:38:48.742620 systemd-networkd[866]: enP12174s1: Link UP
Oct  2 20:38:48.817052 systemd-networkd[866]: enP12174s1: Gained carrier
Oct  2 20:38:48.832936 coreos-metadata[923]: Oct 02 20:38:48.832 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1
Oct  2 20:38:48.842962 coreos-metadata[923]: Oct 02 20:38:48.842 INFO Fetch successful
Oct  2 20:38:48.876582 coreos-metadata[923]: Oct 02 20:38:48.876 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1
Oct  2 20:38:48.902344 coreos-metadata[923]: Oct 02 20:38:48.902 INFO Fetch successful
Oct  2 20:38:48.908009 coreos-metadata[923]: Oct 02 20:38:48.907 INFO wrote hostname ci-3510.3.0-a-c505880dad to /sysroot/etc/hostname
Oct  2 20:38:48.916792 systemd[1]: Finished flatcar-metadata-hostname.service.
Oct  2 20:38:48.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.923046 systemd[1]: Starting ignition-files.service...
Oct  2 20:38:48.954248 kernel: audit: type=1130 audit(1696279128.921:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:48.952900 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 20:38:48.980168 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1010)
Oct  2 20:38:48.980202 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm
Oct  2 20:38:48.980212 kernel: BTRFS info (device sda6): using free space tree
Oct  2 20:38:48.989756 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 20:38:48.994325 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 20:38:49.015190 ignition[1029]: INFO     : Ignition 2.14.0
Oct  2 20:38:49.019383 ignition[1029]: INFO     : Stage: files
Oct  2 20:38:49.019383 ignition[1029]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:49.019383 ignition[1029]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:49.043576 ignition[1029]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:49.043576 ignition[1029]: DEBUG    : files: compiled without relabeling support, skipping
Oct  2 20:38:49.043576 ignition[1029]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Oct  2 20:38:49.043576 ignition[1029]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Oct  2 20:38:49.075124 ignition[1029]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Oct  2 20:38:49.082892 ignition[1029]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Oct  2 20:38:49.090237 ignition[1029]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Oct  2 20:38:49.090179 unknown[1029]: wrote ssh authorized keys file for user: core
Oct  2 20:38:49.102610 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz"
Oct  2 20:38:49.102610 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1
Oct  2 20:38:49.243291 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Oct  2 20:38:49.520304 ignition[1029]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a
Oct  2 20:38:49.537122 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz"
Oct  2 20:38:49.537122 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz"
Oct  2 20:38:49.537122 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1
Oct  2 20:38:49.611699 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Oct  2 20:38:49.744304 ignition[1029]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251
Oct  2 20:38:49.761406 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz"
Oct  2 20:38:49.761406 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Oct  2 20:38:49.761406 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1
Oct  2 20:38:49.866956 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Oct  2 20:38:50.231288 ignition[1029]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3
Oct  2 20:38:50.248093 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Oct  2 20:38:50.248093 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Oct  2 20:38:50.248093 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1
Oct  2 20:38:50.305477 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Oct  2 20:38:51.083096 ignition[1029]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6
Oct  2 20:38:51.099408 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Oct  2 20:38:51.099408 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/bin/kubectl"
Oct  2 20:38:51.099408 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1
Oct  2 20:38:51.134779 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET result: OK
Oct  2 20:38:52.065358 ignition[1029]: DEBUG    : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/home/core/install.sh"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/home/core/nginx.yaml"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/etc/systemd/system/waagent.service"
Oct  2 20:38:52.084627 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 20:38:53.711320 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(c): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem57726830"
Oct  2 20:38:53.733080 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1032)
Oct  2 20:38:53.733101 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem57726830": device or resource busy
Oct  2 20:38:53.733101 ignition[1029]: ERROR    : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem57726830", trying btrfs: device or resource busy
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem57726830"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem57726830"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [started]  unmounting "/mnt/oem57726830"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem57726830"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 20:38:53.733101 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 20:38:53.868932 kernel: audit: type=1130 audit(1696279133.774:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(10): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699042374"
Oct  2 20:38:53.869017 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699042374": device or resource busy
Oct  2 20:38:53.869017 ignition[1029]: ERROR    : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2699042374", trying btrfs: device or resource busy
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(11): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699042374"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2699042374"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(12): [started]  unmounting "/mnt/oem2699042374"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2699042374"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(13): [started]  processing unit "waagent.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(13): [finished] processing unit "waagent.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(14): [started]  processing unit "nvidia.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(14): [finished] processing unit "nvidia.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(15): [started]  processing unit "prepare-cni-plugins.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(15): op(16): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(15): [finished] processing unit "prepare-cni-plugins.service"
Oct  2 20:38:53.869017 ignition[1029]: INFO     : files: op(17): [started]  processing unit "prepare-critools.service"
Oct  2 20:38:54.160880 kernel: audit: type=1130 audit(1696279133.873:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.160907 kernel: audit: type=1131 audit(1696279133.879:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.160918 kernel: audit: type=1130 audit(1696279133.922:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.160928 kernel: audit: type=1130 audit(1696279134.037:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.160937 kernel: audit: type=1131 audit(1696279134.062:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.762306 systemd[1]: Finished ignition-files.service.
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(17): op(18): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(17): [finished] processing unit "prepare-critools.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(19): [started]  setting preset to enabled for "waagent.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(19): [finished] setting preset to enabled for "waagent.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1a): [started]  setting preset to enabled for "nvidia.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1a): [finished] setting preset to enabled for "nvidia.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1b): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1c): [started]  setting preset to enabled for "prepare-critools.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: createResultFile: createFiles: op(1d): [started]  writing file "/sysroot/etc/.ignition-result.json"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json"
Oct  2 20:38:54.165606 ignition[1029]: INFO     : files: files passed
Oct  2 20:38:54.165606 ignition[1029]: INFO     : Ignition finished successfully
Oct  2 20:38:54.383220 kernel: audit: type=1130 audit(1696279134.181:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.383246 kernel: audit: type=1131 audit(1696279134.270:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.802584 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Oct  2 20:38:54.392343 initrd-setup-root-after-ignition[1054]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Oct  2 20:38:53.828372 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Oct  2 20:38:53.829188 systemd[1]: Starting ignition-quench.service...
Oct  2 20:38:53.848152 systemd[1]: ignition-quench.service: Deactivated successfully.
Oct  2 20:38:54.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.848271 systemd[1]: Finished ignition-quench.service.
Oct  2 20:38:53.880105 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Oct  2 20:38:54.487960 kernel: audit: type=1131 audit(1696279134.431:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.487981 kernel: audit: type=1131 audit(1696279134.466:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.922682 systemd[1]: Reached target ignition-complete.target.
Oct  2 20:38:54.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:53.972777 systemd[1]: Starting initrd-parse-etc.service...
Oct  2 20:38:54.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.025442 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Oct  2 20:38:54.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.025556 systemd[1]: Finished initrd-parse-etc.service.
Oct  2 20:38:54.062408 systemd[1]: Reached target initrd-fs.target.
Oct  2 20:38:54.088172 systemd[1]: Reached target initrd.target.
Oct  2 20:38:54.100485 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Oct  2 20:38:54.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.551942 ignition[1067]: INFO     : Ignition 2.14.0
Oct  2 20:38:54.551942 ignition[1067]: INFO     : Stage: umount
Oct  2 20:38:54.551942 ignition[1067]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 20:38:54.551942 ignition[1067]: DEBUG    : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63
Oct  2 20:38:54.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.101456 systemd[1]: Starting dracut-pre-pivot.service...
Oct  2 20:38:54.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.606317 ignition[1067]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/azure"
Oct  2 20:38:54.606317 ignition[1067]: INFO     : umount: umount passed
Oct  2 20:38:54.606317 ignition[1067]: INFO     : Ignition finished successfully
Oct  2 20:38:54.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.177598 systemd[1]: Finished dracut-pre-pivot.service.
Oct  2 20:38:54.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.183144 systemd[1]: Starting initrd-cleanup.service...
Oct  2 20:38:54.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.223521 systemd[1]: Stopped target nss-lookup.target.
Oct  2 20:38:54.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.234253 systemd[1]: Stopped target remote-cryptsetup.target.
Oct  2 20:38:54.246647 systemd[1]: Stopped target timers.target.
Oct  2 20:38:54.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.258388 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Oct  2 20:38:54.258454 systemd[1]: Stopped dracut-pre-pivot.service.
Oct  2 20:38:54.270949 systemd[1]: Stopped target initrd.target.
Oct  2 20:38:54.301036 systemd[1]: Stopped target basic.target.
Oct  2 20:38:54.313596 systemd[1]: Stopped target ignition-complete.target.
Oct  2 20:38:54.327295 systemd[1]: Stopped target ignition-diskful.target.
Oct  2 20:38:54.340910 systemd[1]: Stopped target initrd-root-device.target.
Oct  2 20:38:54.355697 systemd[1]: Stopped target remote-fs.target.
Oct  2 20:38:54.369448 systemd[1]: Stopped target remote-fs-pre.target.
Oct  2 20:38:54.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.377985 systemd[1]: Stopped target sysinit.target.
Oct  2 20:38:54.387300 systemd[1]: Stopped target local-fs.target.
Oct  2 20:38:54.396549 systemd[1]: Stopped target local-fs-pre.target.
Oct  2 20:38:54.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.409076 systemd[1]: Stopped target swap.target.
Oct  2 20:38:54.423352 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Oct  2 20:38:54.423419 systemd[1]: Stopped dracut-pre-mount.service.
Oct  2 20:38:54.431871 systemd[1]: Stopped target cryptsetup.target.
Oct  2 20:38:54.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.458450 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Oct  2 20:38:54.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.458505 systemd[1]: Stopped dracut-initqueue.service.
Oct  2 20:38:54.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.467131 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Oct  2 20:38:54.467172 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Oct  2 20:38:54.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.493600 systemd[1]: ignition-files.service: Deactivated successfully.
Oct  2 20:38:54.843000 audit: BPF prog-id=6 op=UNLOAD
Oct  2 20:38:54.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.493641 systemd[1]: Stopped ignition-files.service.
Oct  2 20:38:54.501989 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully.
Oct  2 20:38:54.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.502028 systemd[1]: Stopped flatcar-metadata-hostname.service.
Oct  2 20:38:54.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.511651 systemd[1]: Stopping ignition-mount.service...
Oct  2 20:38:54.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.528116 systemd[1]: Stopping iscsiuio.service...
Oct  2 20:38:54.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.533703 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Oct  2 20:38:54.536795 systemd[1]: Stopped kmod-static-nodes.service.
Oct  2 20:38:54.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.550190 systemd[1]: Stopping sysroot-boot.service...
Oct  2 20:38:54.574683 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Oct  2 20:38:54.574780 systemd[1]: Stopped systemd-udev-trigger.service.
Oct  2 20:38:54.579895 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Oct  2 20:38:54.579935 systemd[1]: Stopped dracut-pre-trigger.service.
Oct  2 20:38:54.595478 systemd[1]: iscsiuio.service: Deactivated successfully.
Oct  2 20:38:54.963377 kernel: hv_netvsc 0022487d-4eed-0022-487d-4eed0022487d eth0: Data path switched from VF: enP12174s1
Oct  2 20:38:54.595580 systemd[1]: Stopped iscsiuio.service.
Oct  2 20:38:54.602250 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Oct  2 20:38:54.602336 systemd[1]: Finished initrd-cleanup.service.
Oct  2 20:38:54.618681 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Oct  2 20:38:54.619134 systemd[1]: ignition-mount.service: Deactivated successfully.
Oct  2 20:38:54.619223 systemd[1]: Stopped ignition-mount.service.
Oct  2 20:38:54.628272 systemd[1]: ignition-disks.service: Deactivated successfully.
Oct  2 20:38:54.628327 systemd[1]: Stopped ignition-disks.service.
Oct  2 20:38:54.637358 systemd[1]: ignition-kargs.service: Deactivated successfully.
Oct  2 20:38:54.637399 systemd[1]: Stopped ignition-kargs.service.
Oct  2 20:38:54.645571 systemd[1]: ignition-fetch.service: Deactivated successfully.
Oct  2 20:38:54.645604 systemd[1]: Stopped ignition-fetch.service.
Oct  2 20:38:54.654506 systemd[1]: Stopped target network.target.
Oct  2 20:38:54.662608 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Oct  2 20:38:54.662653 systemd[1]: Stopped ignition-fetch-offline.service.
Oct  2 20:38:54.672033 systemd[1]: Stopped target paths.target.
Oct  2 20:38:54.679713 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Oct  2 20:38:54.689775 systemd[1]: Stopped systemd-ask-password-console.path.
Oct  2 20:38:54.697833 systemd[1]: Stopped target slices.target.
Oct  2 20:38:54.705474 systemd[1]: Stopped target sockets.target.
Oct  2 20:38:54.714588 systemd[1]: iscsid.socket: Deactivated successfully.
Oct  2 20:38:54.714622 systemd[1]: Closed iscsid.socket.
Oct  2 20:38:54.722434 systemd[1]: iscsiuio.socket: Deactivated successfully.
Oct  2 20:38:54.722481 systemd[1]: Closed iscsiuio.socket.
Oct  2 20:38:54.730791 systemd[1]: ignition-setup.service: Deactivated successfully.
Oct  2 20:38:54.730835 systemd[1]: Stopped ignition-setup.service.
Oct  2 20:38:54.739226 systemd[1]: Stopping systemd-networkd.service...
Oct  2 20:38:55.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:38:54.747288 systemd[1]: Stopping systemd-resolved.service...
Oct  2 20:38:54.754496 systemd-networkd[866]: eth0: DHCPv6 lease lost
Oct  2 20:38:55.092000 audit: BPF prog-id=9 op=UNLOAD
Oct  2 20:38:54.756364 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 20:38:54.756456 systemd[1]: Stopped systemd-networkd.service.
Oct  2 20:38:54.765981 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Oct  2 20:38:54.766017 systemd[1]: Closed systemd-networkd.socket.
Oct  2 20:38:54.777445 systemd[1]: Stopping network-cleanup.service...
Oct  2 20:38:54.787906 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Oct  2 20:38:54.787967 systemd[1]: Stopped parse-ip-for-networkd.service.
Oct  2 20:38:54.796642 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Oct  2 20:38:54.796698 systemd[1]: Stopped systemd-sysctl.service.
Oct  2 20:38:54.810098 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Oct  2 20:38:54.810146 systemd[1]: Stopped systemd-modules-load.service.
Oct  2 20:38:54.815077 systemd[1]: Stopping systemd-udevd.service...
Oct  2 20:38:54.824302 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Oct  2 20:38:54.824820 systemd[1]: systemd-resolved.service: Deactivated successfully.
Oct  2 20:38:54.824922 systemd[1]: Stopped systemd-resolved.service.
Oct  2 20:38:54.835206 systemd[1]: systemd-udevd.service: Deactivated successfully.
Oct  2 20:38:54.835318 systemd[1]: Stopped systemd-udevd.service.
Oct  2 20:38:54.845259 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Oct  2 20:38:54.845311 systemd[1]: Closed systemd-udevd-control.socket.
Oct  2 20:38:54.855285 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Oct  2 20:38:54.855318 systemd[1]: Closed systemd-udevd-kernel.socket.
Oct  2 20:38:54.860030 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Oct  2 20:38:54.860081 systemd[1]: Stopped dracut-pre-udev.service.
Oct  2 20:38:54.868385 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Oct  2 20:38:54.868432 systemd[1]: Stopped dracut-cmdline.service.
Oct  2 20:38:54.878331 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Oct  2 20:38:54.878373 systemd[1]: Stopped dracut-cmdline-ask.service.
Oct  2 20:38:54.888933 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Oct  2 20:38:54.898187 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Oct  2 20:38:54.898248 systemd[1]: Stopped systemd-vconsole-setup.service.
Oct  2 20:38:54.914986 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Oct  2 20:38:54.915079 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Oct  2 20:38:55.076481 systemd[1]: network-cleanup.service: Deactivated successfully.
Oct  2 20:38:55.076598 systemd[1]: Stopped network-cleanup.service.
Oct  2 20:38:57.922943 kernel: mlx5_core 2f8e:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count
Oct  2 20:39:01.750992 systemd[1]: sysroot-boot.service: Deactivated successfully.
Oct  2 20:39:01.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:01.751101 systemd[1]: Stopped sysroot-boot.service.
Oct  2 20:39:01.791769 kernel: kauditd_printk_skb: 30 callbacks suppressed
Oct  2 20:39:01.791792 kernel: audit: type=1131 audit(1696279141.755:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:01.765113 systemd[1]: Reached target initrd-switch-root.target.
Oct  2 20:39:01.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:01.788039 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Oct  2 20:39:01.825926 kernel: audit: type=1131 audit(1696279141.795:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:01.788111 systemd[1]: Stopped initrd-setup-root.service.
Oct  2 20:39:01.796957 systemd[1]: Starting initrd-switch-root.service...
Oct  2 20:39:01.824256 systemd[1]: Switching root.
Oct  2 20:39:01.854345 iscsid[871]: iscsid shutting down.
Oct  2 20:39:01.857988 systemd-journald[276]: Received SIGTERM from PID 1 (n/a).
Oct  2 20:39:01.858033 systemd-journald[276]: Journal stopped
Oct  2 20:39:06.367209 kernel: SELinux:  Class mctp_socket not defined in policy.
Oct  2 20:39:06.367229 kernel: SELinux:  Class anon_inode not defined in policy.
Oct  2 20:39:06.367239 kernel: SELinux: the above unknown classes and permissions will be allowed
Oct  2 20:39:06.367249 kernel: SELinux:  policy capability network_peer_controls=1
Oct  2 20:39:06.367256 kernel: SELinux:  policy capability open_perms=1
Oct  2 20:39:06.367264 kernel: SELinux:  policy capability extended_socket_class=1
Oct  2 20:39:06.367273 kernel: SELinux:  policy capability always_check_network=0
Oct  2 20:39:06.367282 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct  2 20:39:06.367290 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct  2 20:39:06.367298 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Oct  2 20:39:06.367306 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Oct  2 20:39:06.367314 kernel: audit: type=1403 audit(1696279142.531:80): auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 20:39:06.367324 systemd[1]: Successfully loaded SELinux policy in 149.328ms.
Oct  2 20:39:06.367335 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 14.118ms.
Oct  2 20:39:06.367345 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 20:39:06.367355 systemd[1]: Detected virtualization microsoft.
Oct  2 20:39:06.367364 systemd[1]: Detected architecture arm64.
Oct  2 20:39:06.367373 systemd[1]: Detected first boot.
Oct  2 20:39:06.367382 systemd[1]: Hostname set to <ci-3510.3.0-a-c505880dad>.
Oct  2 20:39:06.367391 systemd[1]: Initializing machine ID from random generator.
Oct  2 20:39:06.367400 kernel: audit: type=1400 audit(1696279142.809:81): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 20:39:06.367409 kernel: audit: type=1400 audit(1696279142.809:82): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 20:39:06.367419 kernel: audit: type=1334 audit(1696279142.827:83): prog-id=10 op=LOAD
Oct  2 20:39:06.367428 kernel: audit: type=1334 audit(1696279142.827:84): prog-id=10 op=UNLOAD
Oct  2 20:39:06.367436 kernel: audit: type=1334 audit(1696279142.844:85): prog-id=11 op=LOAD
Oct  2 20:39:06.367444 kernel: audit: type=1334 audit(1696279142.844:86): prog-id=11 op=UNLOAD
Oct  2 20:39:06.367453 systemd[1]: Populated /etc with preset unit settings.
Oct  2 20:39:06.367462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 20:39:06.367473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 20:39:06.367483 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 20:39:06.367492 kernel: audit: type=1334 audit(1696279145.739:87): prog-id=12 op=LOAD
Oct  2 20:39:06.367501 systemd[1]: iscsid.service: Deactivated successfully.
Oct  2 20:39:06.367509 systemd[1]: Stopped iscsid.service.
Oct  2 20:39:06.367519 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Oct  2 20:39:06.367528 systemd[1]: Stopped initrd-switch-root.service.
Oct  2 20:39:06.367539 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct  2 20:39:06.367548 systemd[1]: Created slice system-addon\x2dconfig.slice.
Oct  2 20:39:06.367557 systemd[1]: Created slice system-addon\x2drun.slice.
Oct  2 20:39:06.367566 systemd[1]: Created slice system-getty.slice.
Oct  2 20:39:06.367575 systemd[1]: Created slice system-modprobe.slice.
Oct  2 20:39:06.367586 systemd[1]: Created slice system-serial\x2dgetty.slice.
Oct  2 20:39:06.367596 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Oct  2 20:39:06.367605 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Oct  2 20:39:06.367614 systemd[1]: Created slice user.slice.
Oct  2 20:39:06.367625 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 20:39:06.367634 systemd[1]: Started systemd-ask-password-wall.path.
Oct  2 20:39:06.367643 systemd[1]: Set up automount boot.automount.
Oct  2 20:39:06.367652 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Oct  2 20:39:06.367661 systemd[1]: Stopped target initrd-switch-root.target.
Oct  2 20:39:06.367670 systemd[1]: Stopped target initrd-fs.target.
Oct  2 20:39:06.367679 systemd[1]: Stopped target initrd-root-fs.target.
Oct  2 20:39:06.367688 systemd[1]: Reached target integritysetup.target.
Oct  2 20:39:06.367699 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 20:39:06.367709 systemd[1]: Reached target remote-fs.target.
Oct  2 20:39:06.367718 systemd[1]: Reached target slices.target.
Oct  2 20:39:06.367727 systemd[1]: Reached target swap.target.
Oct  2 20:39:06.367736 systemd[1]: Reached target torcx.target.
Oct  2 20:39:06.367746 systemd[1]: Reached target veritysetup.target.
Oct  2 20:39:06.367766 systemd[1]: Listening on systemd-coredump.socket.
Oct  2 20:39:06.367779 systemd[1]: Listening on systemd-initctl.socket.
Oct  2 20:39:06.367789 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 20:39:06.367798 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 20:39:06.367807 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 20:39:06.367817 systemd[1]: Listening on systemd-userdbd.socket.
Oct  2 20:39:06.367826 systemd[1]: Mounting dev-hugepages.mount...
Oct  2 20:39:06.367835 systemd[1]: Mounting dev-mqueue.mount...
Oct  2 20:39:06.367846 systemd[1]: Mounting media.mount...
Oct  2 20:39:06.367856 systemd[1]: Mounting sys-kernel-debug.mount...
Oct  2 20:39:06.367865 systemd[1]: Mounting sys-kernel-tracing.mount...
Oct  2 20:39:06.367874 systemd[1]: Mounting tmp.mount...
Oct  2 20:39:06.367883 systemd[1]: Starting flatcar-tmpfiles.service...
Oct  2 20:39:06.367892 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Oct  2 20:39:06.367902 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 20:39:06.367912 systemd[1]: Starting modprobe@configfs.service...
Oct  2 20:39:06.367921 systemd[1]: Starting modprobe@dm_mod.service...
Oct  2 20:39:06.367932 systemd[1]: Starting modprobe@drm.service...
Oct  2 20:39:06.367941 systemd[1]: Starting modprobe@efi_pstore.service...
Oct  2 20:39:06.367950 systemd[1]: Starting modprobe@fuse.service...
Oct  2 20:39:06.367960 systemd[1]: Starting modprobe@loop.service...
Oct  2 20:39:06.367970 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Oct  2 20:39:06.367979 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Oct  2 20:39:06.367989 systemd[1]: Stopped systemd-fsck-root.service.
Oct  2 20:39:06.367998 kernel: fuse: init (API version 7.34)
Oct  2 20:39:06.368007 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Oct  2 20:39:06.368017 systemd[1]: Stopped systemd-fsck-usr.service.
Oct  2 20:39:06.368026 systemd[1]: Stopped systemd-journald.service.
Oct  2 20:39:06.368036 systemd[1]: systemd-journald.service: Consumed 3.269s CPU time.
Oct  2 20:39:06.368045 kernel: loop: module loaded
Oct  2 20:39:06.368054 systemd[1]: Starting systemd-journald.service...
Oct  2 20:39:06.368063 systemd[1]: Starting systemd-modules-load.service...
Oct  2 20:39:06.368072 systemd[1]: Starting systemd-network-generator.service...
Oct  2 20:39:06.368081 systemd[1]: Starting systemd-remount-fs.service...
Oct  2 20:39:06.368092 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 20:39:06.368101 systemd[1]: verity-setup.service: Deactivated successfully.
Oct  2 20:39:06.368110 systemd[1]: Stopped verity-setup.service.
Oct  2 20:39:06.368122 systemd-journald[1207]: Journal started
Oct  2 20:39:06.368159 systemd-journald[1207]: Runtime Journal (/run/log/journal/2b9c817caf7040a8a5f8d96149dcdaa1) is 8.0M, max 78.6M, 70.6M free.
Oct  2 20:39:02.531000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 20:39:02.809000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 20:39:02.809000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 20:39:02.827000 audit: BPF prog-id=10 op=LOAD
Oct  2 20:39:02.827000 audit: BPF prog-id=10 op=UNLOAD
Oct  2 20:39:02.844000 audit: BPF prog-id=11 op=LOAD
Oct  2 20:39:02.844000 audit: BPF prog-id=11 op=UNLOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=12 op=LOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=3 op=UNLOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=13 op=LOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=14 op=LOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=4 op=UNLOAD
Oct  2 20:39:05.739000 audit: BPF prog-id=5 op=UNLOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=15 op=LOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=12 op=UNLOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=16 op=LOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=17 op=LOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=13 op=UNLOAD
Oct  2 20:39:05.746000 audit: BPF prog-id=14 op=UNLOAD
Oct  2 20:39:05.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:05.761000 audit: BPF prog-id=15 op=UNLOAD
Oct  2 20:39:05.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:05.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:05.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.293000 audit: BPF prog-id=18 op=LOAD
Oct  2 20:39:06.293000 audit: BPF prog-id=19 op=LOAD
Oct  2 20:39:06.293000 audit: BPF prog-id=20 op=LOAD
Oct  2 20:39:06.293000 audit: BPF prog-id=16 op=UNLOAD
Oct  2 20:39:06.293000 audit: BPF prog-id=17 op=UNLOAD
Oct  2 20:39:06.360000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 20:39:06.360000 audit[1207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd208ad50 a2=4000 a3=1 items=0 ppid=1 pid=1207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:39:06.360000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Oct  2 20:39:03.265957 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 20:39:05.739175 systemd[1]: Queued start job for default target multi-user.target.
Oct  2 20:39:03.280135 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 20:39:05.748419 systemd[1]: systemd-journald.service: Deactivated successfully.
Oct  2 20:39:03.280177 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 20:39:05.748786 systemd[1]: systemd-journald.service: Consumed 3.269s CPU time.
Oct  2 20:39:03.280222 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Oct  2 20:39:03.280243 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="skipped missing lower profile" missing profile=oem
Oct  2 20:39:06.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:03.280285 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Oct  2 20:39:03.280298 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Oct  2 20:39:03.280532 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Oct  2 20:39:03.280583 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 20:39:03.280596 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 20:39:03.280974 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Oct  2 20:39:03.281015 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Oct  2 20:39:03.281034 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0
Oct  2 20:39:03.281048 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Oct  2 20:39:03.281064 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0
Oct  2 20:39:03.281086 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Oct  2 20:39:05.278246 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 20:39:05.278513 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 20:39:05.278620 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 20:39:05.278809 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 20:39:05.278886 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Oct  2 20:39:05.278954 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2023-10-02T20:39:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Oct  2 20:39:06.384689 systemd[1]: Started systemd-journald.service.
Oct  2 20:39:06.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.385459 systemd[1]: Mounted dev-hugepages.mount.
Oct  2 20:39:06.390205 systemd[1]: Mounted dev-mqueue.mount.
Oct  2 20:39:06.394424 systemd[1]: Mounted media.mount.
Oct  2 20:39:06.398196 systemd[1]: Mounted sys-kernel-debug.mount.
Oct  2 20:39:06.402595 systemd[1]: Mounted sys-kernel-tracing.mount.
Oct  2 20:39:06.407065 systemd[1]: Mounted tmp.mount.
Oct  2 20:39:06.410902 systemd[1]: Finished flatcar-tmpfiles.service.
Oct  2 20:39:06.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.415879 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 20:39:06.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.420729 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Oct  2 20:39:06.420957 systemd[1]: Finished modprobe@configfs.service.
Oct  2 20:39:06.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.425890 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Oct  2 20:39:06.426007 systemd[1]: Finished modprobe@dm_mod.service.
Oct  2 20:39:06.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.430845 systemd[1]: modprobe@drm.service: Deactivated successfully.
Oct  2 20:39:06.430962 systemd[1]: Finished modprobe@drm.service.
Oct  2 20:39:06.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.435779 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Oct  2 20:39:06.435901 systemd[1]: Finished modprobe@efi_pstore.service.
Oct  2 20:39:06.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.440921 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Oct  2 20:39:06.441036 systemd[1]: Finished modprobe@fuse.service.
Oct  2 20:39:06.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.445774 systemd[1]: modprobe@loop.service: Deactivated successfully.
Oct  2 20:39:06.445893 systemd[1]: Finished modprobe@loop.service.
Oct  2 20:39:06.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.450595 systemd[1]: Finished systemd-modules-load.service.
Oct  2 20:39:06.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.455718 systemd[1]: Finished systemd-network-generator.service.
Oct  2 20:39:06.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.461306 systemd[1]: Finished systemd-remount-fs.service.
Oct  2 20:39:06.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.466371 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 20:39:06.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.471852 systemd[1]: Reached target network-pre.target.
Oct  2 20:39:06.477670 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Oct  2 20:39:06.483404 systemd[1]: Mounting sys-kernel-config.mount...
Oct  2 20:39:06.487677 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Oct  2 20:39:06.497824 systemd[1]: Starting systemd-hwdb-update.service...
Oct  2 20:39:06.503305 systemd[1]: Starting systemd-journal-flush.service...
Oct  2 20:39:06.507708 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Oct  2 20:39:06.508721 systemd[1]: Starting systemd-random-seed.service...
Oct  2 20:39:06.513251 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Oct  2 20:39:06.514280 systemd[1]: Starting systemd-sysctl.service...
Oct  2 20:39:06.521744 systemd[1]: Starting systemd-sysusers.service...
Oct  2 20:39:06.530946 systemd[1]: Starting systemd-udev-settle.service...
Oct  2 20:39:06.532613 systemd-journald[1207]: Time spent on flushing to /var/log/journal/2b9c817caf7040a8a5f8d96149dcdaa1 is 24.884ms for 1090 entries.
Oct  2 20:39:06.532613 systemd-journald[1207]: System Journal (/var/log/journal/2b9c817caf7040a8a5f8d96149dcdaa1) is 8.0M, max 2.6G, 2.6G free.
Oct  2 20:39:06.614910 systemd-journald[1207]: Received client request to flush runtime journal.
Oct  2 20:39:06.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.544938 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Oct  2 20:39:06.615191 udevadm[1221]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Oct  2 20:39:06.550253 systemd[1]: Mounted sys-kernel-config.mount.
Oct  2 20:39:06.557388 systemd[1]: Finished systemd-random-seed.service.
Oct  2 20:39:06.566529 systemd[1]: Reached target first-boot-complete.target.
Oct  2 20:39:06.606458 systemd[1]: Finished systemd-sysctl.service.
Oct  2 20:39:06.616202 systemd[1]: Finished systemd-journal-flush.service.
Oct  2 20:39:06.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:06.747213 systemd[1]: Finished systemd-sysusers.service.
Oct  2 20:39:06.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.079831 systemd[1]: Finished systemd-hwdb-update.service.
Oct  2 20:39:07.107144 kernel: kauditd_printk_skb: 52 callbacks suppressed
Oct  2 20:39:07.107216 kernel: audit: type=1130 audit(1696279147.084:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.089000 audit: BPF prog-id=21 op=LOAD
Oct  2 20:39:07.112930 kernel: audit: type=1334 audit(1696279147.089:139): prog-id=21 op=LOAD
Oct  2 20:39:07.107912 systemd[1]: Starting systemd-udevd.service...
Oct  2 20:39:07.106000 audit: BPF prog-id=22 op=LOAD
Oct  2 20:39:07.118784 kernel: audit: type=1334 audit(1696279147.106:140): prog-id=22 op=LOAD
Oct  2 20:39:07.106000 audit: BPF prog-id=7 op=UNLOAD
Oct  2 20:39:07.127451 kernel: audit: type=1334 audit(1696279147.106:141): prog-id=7 op=UNLOAD
Oct  2 20:39:07.106000 audit: BPF prog-id=8 op=UNLOAD
Oct  2 20:39:07.133048 kernel: audit: type=1334 audit(1696279147.106:142): prog-id=8 op=UNLOAD
Oct  2 20:39:07.147726 systemd-udevd[1224]: Using default interface naming scheme 'v252'.
Oct  2 20:39:07.194910 systemd[1]: Started systemd-udevd.service.
Oct  2 20:39:07.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.202864 systemd[1]: Starting systemd-networkd.service...
Oct  2 20:39:07.199000 audit: BPF prog-id=23 op=LOAD
Oct  2 20:39:07.231725 kernel: audit: type=1130 audit(1696279147.199:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.231871 kernel: audit: type=1334 audit(1696279147.199:144): prog-id=23 op=LOAD
Oct  2 20:39:07.237000 audit: BPF prog-id=24 op=LOAD
Oct  2 20:39:07.244647 systemd[1]: Starting systemd-userdbd.service...
Oct  2 20:39:07.237000 audit: BPF prog-id=25 op=LOAD
Oct  2 20:39:07.255459 kernel: audit: type=1334 audit(1696279147.237:145): prog-id=24 op=LOAD
Oct  2 20:39:07.255513 kernel: audit: type=1334 audit(1696279147.237:146): prog-id=25 op=LOAD
Oct  2 20:39:07.237000 audit: BPF prog-id=26 op=LOAD
Oct  2 20:39:07.262456 kernel: audit: type=1334 audit(1696279147.237:147): prog-id=26 op=LOAD
Oct  2 20:39:07.285025 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped.
Oct  2 20:39:07.299156 systemd[1]: Started systemd-userdbd.service.
Oct  2 20:39:07.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.378811 kernel: mousedev: PS/2 mouse device common for all mice
Oct  2 20:39:07.400798 kernel: hv_vmbus: registering driver hyperv_fb
Oct  2 20:39:07.400879 kernel: hyperv_fb: Synthvid Version major 3, minor 5
Oct  2 20:39:07.413822 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608
Oct  2 20:39:07.422099 kernel: Console: switching to colour dummy device 80x25
Oct  2 20:39:07.425822 kernel: Console: switching to colour frame buffer device 128x48
Oct  2 20:39:07.432780 kernel: hv_utils: Registering HyperV Utility Driver
Oct  2 20:39:07.432836 kernel: hv_vmbus: registering driver hv_utils
Oct  2 20:39:07.432890 kernel: hv_utils: Heartbeat IC version 3.0
Oct  2 20:39:07.394000 audit[1232]: AVC avc:  denied  { confidentiality } for  pid=1232 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 20:39:07.448797 kernel: hv_vmbus: registering driver hv_balloon
Oct  2 20:39:07.448856 kernel: hv_utils: TimeSync IC version 4.0
Oct  2 20:39:07.464393 kernel: hv_utils: Shutdown IC version 3.2
Oct  2 20:39:07.473900 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0
Oct  2 20:39:07.473970 kernel: hv_balloon: Memory hot add disabled on ARM64
Oct  2 20:39:07.394000 audit[1232]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab082cb0e0 a1=aa2c a2=ffff92e624b0 a3=aaab08225010 items=10 ppid=1224 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:39:07.394000 audit: CWD cwd="/"
Oct  2 20:39:07.394000 audit: PATH item=0 name=(null) inode=11166 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=1 name=(null) inode=11167 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=2 name=(null) inode=11166 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=3 name=(null) inode=11168 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=4 name=(null) inode=11166 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=5 name=(null) inode=11169 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=6 name=(null) inode=11166 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=7 name=(null) inode=11170 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=8 name=(null) inode=11166 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PATH item=9 name=(null) inode=11171 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:39:07.394000 audit: PROCTITLE proctitle="(udev-worker)"
Oct  2 20:39:07.489879 systemd-networkd[1234]: lo: Link UP
Oct  2 20:39:07.489890 systemd-networkd[1234]: lo: Gained carrier
Oct  2 20:39:07.490274 systemd-networkd[1234]: Enumeration completed
Oct  2 20:39:07.490382 systemd[1]: Started systemd-networkd.service.
Oct  2 20:39:07.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.496832 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 20:39:07.507053 systemd-networkd[1234]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 20:39:07.547408 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1228)
Oct  2 20:39:07.563457 kernel: mlx5_core 2f8e:00:02.0 enP12174s1: Link up
Oct  2 20:39:07.578969 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 20:39:07.610383 kernel: hv_netvsc 0022487d-4eed-0022-487d-4eed0022487d eth0: Data path switched to VF: enP12174s1
Oct  2 20:39:07.610417 systemd-networkd[1234]: enP12174s1: Link UP
Oct  2 20:39:07.610510 systemd-networkd[1234]: eth0: Link UP
Oct  2 20:39:07.610513 systemd-networkd[1234]: eth0: Gained carrier
Oct  2 20:39:07.615458 systemd-networkd[1234]: enP12174s1: Gained carrier
Oct  2 20:39:07.620487 systemd-networkd[1234]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16
Oct  2 20:39:07.978890 systemd[1]: Finished systemd-udev-settle.service.
Oct  2 20:39:07.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:07.985167 systemd[1]: Starting lvm2-activation-early.service...
Oct  2 20:39:08.073975 lvm[1301]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 20:39:08.101476 systemd[1]: Finished lvm2-activation-early.service.
Oct  2 20:39:08.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.106631 systemd[1]: Reached target cryptsetup.target.
Oct  2 20:39:08.112303 systemd[1]: Starting lvm2-activation.service...
Oct  2 20:39:08.119431 lvm[1302]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 20:39:08.142429 systemd[1]: Finished lvm2-activation.service.
Oct  2 20:39:08.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.147236 systemd[1]: Reached target local-fs-pre.target.
Oct  2 20:39:08.152073 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Oct  2 20:39:08.152100 systemd[1]: Reached target local-fs.target.
Oct  2 20:39:08.156532 systemd[1]: Reached target machines.target.
Oct  2 20:39:08.162688 systemd[1]: Starting ldconfig.service...
Oct  2 20:39:08.166730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Oct  2 20:39:08.166799 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 20:39:08.167892 systemd[1]: Starting systemd-boot-update.service...
Oct  2 20:39:08.173090 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Oct  2 20:39:08.180442 systemd[1]: Starting systemd-machine-id-commit.service...
Oct  2 20:39:08.189626 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Oct  2 20:39:08.189692 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Oct  2 20:39:08.190703 systemd[1]: Starting systemd-tmpfiles-setup.service...
Oct  2 20:39:08.197148 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1304 (bootctl)
Oct  2 20:39:08.198481 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Oct  2 20:39:08.221506 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Oct  2 20:39:08.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.775883 systemd-tmpfiles[1307]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Oct  2 20:39:08.798964 systemd-fsck[1312]: fsck.fat 4.2 (2021-01-31)
Oct  2 20:39:08.798964 systemd-fsck[1312]: /dev/sda1: 236 files, 113463/258078 clusters
Oct  2 20:39:08.807280 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Oct  2 20:39:08.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.817297 systemd-tmpfiles[1307]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Oct  2 20:39:08.818029 systemd[1]: Mounting boot.mount...
Oct  2 20:39:08.830908 systemd[1]: Mounted boot.mount.
Oct  2 20:39:08.842181 systemd[1]: Finished systemd-boot-update.service.
Oct  2 20:39:08.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.848942 systemd-tmpfiles[1307]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Oct  2 20:39:08.938492 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Oct  2 20:39:08.939066 systemd[1]: Finished systemd-machine-id-commit.service.
Oct  2 20:39:08.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:08.995507 systemd-networkd[1234]: eth0: Gained IPv6LL
Oct  2 20:39:09.003751 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 20:39:09.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.049931 systemd[1]: Finished systemd-tmpfiles-setup.service.
Oct  2 20:39:09.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.056639 systemd[1]: Starting audit-rules.service...
Oct  2 20:39:09.062214 systemd[1]: Starting clean-ca-certificates.service...
Oct  2 20:39:09.068028 systemd[1]: Starting systemd-journal-catalog-update.service...
Oct  2 20:39:09.075000 audit: BPF prog-id=27 op=LOAD
Oct  2 20:39:09.081000 audit: BPF prog-id=28 op=LOAD
Oct  2 20:39:09.076531 systemd[1]: Starting systemd-resolved.service...
Oct  2 20:39:09.083762 systemd[1]: Starting systemd-timesyncd.service...
Oct  2 20:39:09.090612 systemd[1]: Starting systemd-update-utmp.service...
Oct  2 20:39:09.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.097545 systemd[1]: Finished clean-ca-certificates.service.
Oct  2 20:39:09.103083 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Oct  2 20:39:09.120000 audit[1324]: SYSTEM_BOOT pid=1324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.123090 systemd[1]: Finished systemd-update-utmp.service.
Oct  2 20:39:09.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.143402 systemd[1]: Finished systemd-journal-catalog-update.service.
Oct  2 20:39:09.178652 systemd[1]: Started systemd-timesyncd.service.
Oct  2 20:39:09.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.183459 systemd[1]: Reached target time-set.target.
Oct  2 20:39:09.205918 systemd-resolved[1322]: Positive Trust Anchors:
Oct  2 20:39:09.205933 systemd-resolved[1322]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 20:39:09.205960 systemd-resolved[1322]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 20:39:09.225620 systemd-resolved[1322]: Using system hostname 'ci-3510.3.0-a-c505880dad'.
Oct  2 20:39:09.227527 systemd[1]: Started systemd-resolved.service.
Oct  2 20:39:09.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:39:09.232300 systemd[1]: Reached target network.target.
Oct  2 20:39:09.236756 systemd[1]: Reached target network-online.target.
Oct  2 20:39:09.241863 systemd[1]: Reached target nss-lookup.target.
Oct  2 20:39:09.254000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 20:39:09.254000 audit[1339]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff28bed60 a2=420 a3=0 items=0 ppid=1318 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:39:09.254000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 20:39:09.257908 augenrules[1339]: No rules
Oct  2 20:39:09.258975 systemd[1]: Finished audit-rules.service.
Oct  2 20:39:09.436206 systemd-timesyncd[1323]: Contacted time server 208.113.130.146:123 (0.flatcar.pool.ntp.org).
Oct  2 20:39:09.436653 systemd-timesyncd[1323]: Initial clock synchronization to Mon 2023-10-02 20:39:09.439897 UTC.
Oct  2 20:39:10.699857 ldconfig[1303]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Oct  2 20:39:10.716678 systemd[1]: Finished ldconfig.service.
Oct  2 20:39:10.722076 systemd[1]: Starting systemd-update-done.service...
Oct  2 20:39:10.741370 systemd[1]: Finished systemd-update-done.service.
Oct  2 20:39:10.746628 systemd[1]: Reached target sysinit.target.
Oct  2 20:39:10.751035 systemd[1]: Started motdgen.path.
Oct  2 20:39:10.754755 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Oct  2 20:39:10.761090 systemd[1]: Started logrotate.timer.
Oct  2 20:39:10.765068 systemd[1]: Started mdadm.timer.
Oct  2 20:39:10.768637 systemd[1]: Started systemd-tmpfiles-clean.timer.
Oct  2 20:39:10.773237 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Oct  2 20:39:10.773269 systemd[1]: Reached target paths.target.
Oct  2 20:39:10.777557 systemd[1]: Reached target timers.target.
Oct  2 20:39:10.782260 systemd[1]: Listening on dbus.socket.
Oct  2 20:39:10.787316 systemd[1]: Starting docker.socket...
Oct  2 20:39:10.793893 systemd[1]: Listening on sshd.socket.
Oct  2 20:39:10.797958 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 20:39:10.798432 systemd[1]: Listening on docker.socket.
Oct  2 20:39:10.802544 systemd[1]: Reached target sockets.target.
Oct  2 20:39:10.806736 systemd[1]: Reached target basic.target.
Oct  2 20:39:10.810947 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 20:39:10.810977 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 20:39:10.812378 systemd[1]: Starting containerd.service...
Oct  2 20:39:10.817484 systemd[1]: Starting dbus.service...
Oct  2 20:39:10.821961 systemd[1]: Starting enable-oem-cloudinit.service...
Oct  2 20:39:10.828871 systemd[1]: Starting extend-filesystems.service...
Oct  2 20:39:10.833090 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Oct  2 20:39:10.834103 systemd[1]: Starting motdgen.service...
Oct  2 20:39:10.841761 systemd[1]: Started nvidia.service.
Oct  2 20:39:10.850257 systemd[1]: Starting prepare-cni-plugins.service...
Oct  2 20:39:10.858276 jq[1349]: false
Oct  2 20:39:10.858342 systemd[1]: Starting prepare-critools.service...
Oct  2 20:39:10.864158 systemd[1]: Starting ssh-key-proc-cmdline.service...
Oct  2 20:39:10.872296 systemd[1]: Starting sshd-keygen.service...
Oct  2 20:39:10.882651 systemd[1]: Starting systemd-logind.service...
Oct  2 20:39:10.888751 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 20:39:10.888825 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Oct  2 20:39:10.889305 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Oct  2 20:39:10.890046 systemd[1]: Starting update-engine.service...
Oct  2 20:39:10.897532 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Oct  2 20:39:10.907642 jq[1373]: true
Oct  2 20:39:10.908510 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Oct  2 20:39:10.908751 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Oct  2 20:39:10.910756 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Oct  2 20:39:10.911087 systemd[1]: Finished ssh-key-proc-cmdline.service.
Oct  2 20:39:10.931502 systemd[1]: motdgen.service: Deactivated successfully.
Oct  2 20:39:10.931670 systemd[1]: Finished motdgen.service.
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda1
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda2
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda3
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found usr
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda4
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda6
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda7
Oct  2 20:39:10.939421 extend-filesystems[1350]: Found sda9
Oct  2 20:39:11.060837 jq[1378]: true
Oct  2 20:39:11.011342 dbus-daemon[1348]: [system] SELinux support is enabled
Oct  2 20:39:11.061137 extend-filesystems[1350]: Checking size of /dev/sda9
Oct  2 20:39:11.061137 extend-filesystems[1350]: Old size kept for /dev/sda9
Oct  2 20:39:11.061137 extend-filesystems[1350]: Found sr0
Oct  2 20:39:11.093929 tar[1375]: ./
Oct  2 20:39:11.093929 tar[1375]: ./loopback
Oct  2 20:39:11.004742 systemd[1]: extend-filesystems.service: Deactivated successfully.
Oct  2 20:39:11.095145 tar[1376]: crictl
Oct  2 20:39:11.004899 systemd[1]: Finished extend-filesystems.service.
Oct  2 20:39:11.011531 systemd[1]: Started dbus.service.
Oct  2 20:39:11.017744 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Oct  2 20:39:11.017767 systemd[1]: Reached target system-config.target.
Oct  2 20:39:11.023515 systemd-logind[1363]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard)
Oct  2 20:39:11.024999 systemd-logind[1363]: New seat seat0.
Oct  2 20:39:11.025113 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Oct  2 20:39:11.025128 systemd[1]: Reached target user-config.target.
Oct  2 20:39:11.043735 systemd[1]: Started systemd-logind.service.
Oct  2 20:39:11.148923 env[1379]: time="2023-10-02T20:39:11.148757975Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Oct  2 20:39:11.153745 tar[1375]: ./bandwidth
Oct  2 20:39:11.159862 systemd[1]: nvidia.service: Deactivated successfully.
Oct  2 20:39:11.167889 update_engine[1368]: I1002 20:39:11.163398  1368 main.cc:92] Flatcar Update Engine starting
Oct  2 20:39:11.192543 systemd[1]: Started update-engine.service.
Oct  2 20:39:11.199311 update_engine[1368]: I1002 20:39:11.199198  1368 update_check_scheduler.cc:74] Next update check in 3m20s
Oct  2 20:39:11.200592 systemd[1]: Started locksmithd.service.
Oct  2 20:39:11.209407 bash[1427]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 20:39:11.210873 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Oct  2 20:39:11.248444 tar[1375]: ./ptp
Oct  2 20:39:11.249824 env[1379]: time="2023-10-02T20:39:11.249786063Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Oct  2 20:39:11.249945 env[1379]: time="2023-10-02T20:39:11.249923934Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.261223 env[1379]: time="2023-10-02T20:39:11.261175727Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Oct  2 20:39:11.261223 env[1379]: time="2023-10-02T20:39:11.261216336Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.263167 env[1379]: time="2023-10-02T20:39:11.263130804Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 20:39:11.263167 env[1379]: time="2023-10-02T20:39:11.263165532Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.263255 env[1379]: time="2023-10-02T20:39:11.263182296Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Oct  2 20:39:11.263255 env[1379]: time="2023-10-02T20:39:11.263192698Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.263305 env[1379]: time="2023-10-02T20:39:11.263283678Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.266227 env[1379]: time="2023-10-02T20:39:11.266194728Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Oct  2 20:39:11.266494 env[1379]: time="2023-10-02T20:39:11.266469110Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 20:39:11.266527 env[1379]: time="2023-10-02T20:39:11.266493235Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Oct  2 20:39:11.266594 env[1379]: time="2023-10-02T20:39:11.266575093Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Oct  2 20:39:11.266638 env[1379]: time="2023-10-02T20:39:11.266593137Z" level=info msg="metadata content store policy set" policy=shared
Oct  2 20:39:11.285930 tar[1375]: ./vlan
Oct  2 20:39:11.289163 env[1379]: time="2023-10-02T20:39:11.289116529Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Oct  2 20:39:11.289163 env[1379]: time="2023-10-02T20:39:11.289163619Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Oct  2 20:39:11.289297 env[1379]: time="2023-10-02T20:39:11.289180663Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Oct  2 20:39:11.289297 env[1379]: time="2023-10-02T20:39:11.289217831Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289297 env[1379]: time="2023-10-02T20:39:11.289234595Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289297 env[1379]: time="2023-10-02T20:39:11.289248318Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289297 env[1379]: time="2023-10-02T20:39:11.289262041Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289673 env[1379]: time="2023-10-02T20:39:11.289648608Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289722 env[1379]: time="2023-10-02T20:39:11.289674333Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289722 env[1379]: time="2023-10-02T20:39:11.289688897Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289722 env[1379]: time="2023-10-02T20:39:11.289701339Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.289722 env[1379]: time="2023-10-02T20:39:11.289714222Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Oct  2 20:39:11.289857 env[1379]: time="2023-10-02T20:39:11.289833169Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Oct  2 20:39:11.289944 env[1379]: time="2023-10-02T20:39:11.289923909Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Oct  2 20:39:11.290228 env[1379]: time="2023-10-02T20:39:11.290205892Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Oct  2 20:39:11.290275 env[1379]: time="2023-10-02T20:39:11.290239860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290275 env[1379]: time="2023-10-02T20:39:11.290253383Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Oct  2 20:39:11.290342 env[1379]: time="2023-10-02T20:39:11.290324199Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290342 env[1379]: time="2023-10-02T20:39:11.290337722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290410 env[1379]: time="2023-10-02T20:39:11.290350124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290460 env[1379]: time="2023-10-02T20:39:11.290438064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290492 env[1379]: time="2023-10-02T20:39:11.290460909Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290492 env[1379]: time="2023-10-02T20:39:11.290476153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290492 env[1379]: time="2023-10-02T20:39:11.290487155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290563 env[1379]: time="2023-10-02T20:39:11.290498197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290563 env[1379]: time="2023-10-02T20:39:11.290511680Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Oct  2 20:39:11.290656 env[1379]: time="2023-10-02T20:39:11.290627386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290656 env[1379]: time="2023-10-02T20:39:11.290642670Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290697 env[1379]: time="2023-10-02T20:39:11.290655113Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.290697 env[1379]: time="2023-10-02T20:39:11.290666435Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Oct  2 20:39:11.290697 env[1379]: time="2023-10-02T20:39:11.290680598Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Oct  2 20:39:11.290697 env[1379]: time="2023-10-02T20:39:11.290691081Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Oct  2 20:39:11.290771 env[1379]: time="2023-10-02T20:39:11.290706524Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Oct  2 20:39:11.290771 env[1379]: time="2023-10-02T20:39:11.290739491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Oct  2 20:39:11.291012 env[1379]: time="2023-10-02T20:39:11.290946178Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Oct  2 20:39:11.291012 env[1379]: time="2023-10-02T20:39:11.291007071Z" level=info msg="Connect containerd service"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.291038278Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.291641173Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.291839137Z" level=info msg="Start subscribing containerd event"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.291933078Z" level=info msg="Start recovering state"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.292005654Z" level=info msg="Start event monitor"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.292061467Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.292083592Z" level=info msg="Start snapshots syncer"
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.292096675Z" level=info msg=serving... address=/run/containerd/containerd.sock
Oct  2 20:39:11.297107 env[1379]: time="2023-10-02T20:39:11.292145285Z" level=info msg="containerd successfully booted in 0.144155s"
Oct  2 20:39:11.292234 systemd[1]: Started containerd.service.
Oct  2 20:39:11.309983 env[1379]: time="2023-10-02T20:39:11.292093314Z" level=info msg="Start cni network conf syncer for default"
Oct  2 20:39:11.313451 env[1379]: time="2023-10-02T20:39:11.313379189Z" level=info msg="Start streaming server"
Oct  2 20:39:11.364327 tar[1375]: ./host-device
Oct  2 20:39:11.425443 tar[1375]: ./tuning
Oct  2 20:39:11.478463 tar[1375]: ./vrf
Oct  2 20:39:11.535105 tar[1375]: ./sbr
Oct  2 20:39:11.584065 tar[1375]: ./tap
Oct  2 20:39:11.616414 tar[1375]: ./dhcp
Oct  2 20:39:11.735144 tar[1375]: ./static
Oct  2 20:39:11.763267 tar[1375]: ./firewall
Oct  2 20:39:11.804113 tar[1375]: ./macvlan
Oct  2 20:39:11.843082 tar[1375]: ./dummy
Oct  2 20:39:11.880753 tar[1375]: ./bridge
Oct  2 20:39:11.904419 systemd[1]: Finished prepare-critools.service.
Oct  2 20:39:11.937632 tar[1375]: ./ipvlan
Oct  2 20:39:11.971191 tar[1375]: ./portmap
Oct  2 20:39:12.002925 tar[1375]: ./host-local
Oct  2 20:39:12.065303 systemd[1]: Finished prepare-cni-plugins.service.
Oct  2 20:39:12.269398 sshd_keygen[1383]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Oct  2 20:39:12.297292 systemd[1]: Finished sshd-keygen.service.
Oct  2 20:39:12.303936 systemd[1]: Starting issuegen.service...
Oct  2 20:39:12.312461 systemd[1]: Started waagent.service.
Oct  2 20:39:12.317110 systemd[1]: issuegen.service: Deactivated successfully.
Oct  2 20:39:12.317840 systemd[1]: Finished issuegen.service.
Oct  2 20:39:12.323945 systemd[1]: Starting systemd-user-sessions.service...
Oct  2 20:39:12.348833 systemd[1]: Finished systemd-user-sessions.service.
Oct  2 20:39:12.356009 systemd[1]: Started getty@tty1.service.
Oct  2 20:39:12.363091 systemd[1]: Started serial-getty@ttyAMA0.service.
Oct  2 20:39:12.368646 systemd[1]: Reached target getty.target.
Oct  2 20:39:12.373172 systemd[1]: Reached target multi-user.target.
Oct  2 20:39:12.383762 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Oct  2 20:39:12.399260 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Oct  2 20:39:12.399445 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Oct  2 20:39:12.405107 systemd[1]: Startup finished in 762ms (kernel) + 19.684s (initrd) + 10.065s (userspace) = 30.512s.
Oct  2 20:39:12.460195 locksmithd[1437]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Oct  2 20:39:12.598986 login[1460]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 20:39:12.600081 login[1461]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 20:39:12.616733 systemd[1]: Created slice user-500.slice.
Oct  2 20:39:12.617849 systemd[1]: Starting user-runtime-dir@500.service...
Oct  2 20:39:12.621436 systemd-logind[1363]: New session 2 of user core.
Oct  2 20:39:12.624742 systemd-logind[1363]: New session 1 of user core.
Oct  2 20:39:12.638204 systemd[1]: Finished user-runtime-dir@500.service.
Oct  2 20:39:12.639602 systemd[1]: Starting user@500.service...
Oct  2 20:39:12.652294 (systemd)[1466]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:39:12.811837 systemd[1466]: Queued start job for default target default.target.
Oct  2 20:39:12.813028 systemd[1466]: Reached target paths.target.
Oct  2 20:39:12.813158 systemd[1466]: Reached target sockets.target.
Oct  2 20:39:12.813232 systemd[1466]: Reached target timers.target.
Oct  2 20:39:12.813302 systemd[1466]: Reached target basic.target.
Oct  2 20:39:12.813480 systemd[1]: Started user@500.service.
Oct  2 20:39:12.814300 systemd[1]: Started session-1.scope.
Oct  2 20:39:12.814841 systemd[1]: Started session-2.scope.
Oct  2 20:39:12.815430 systemd[1466]: Reached target default.target.
Oct  2 20:39:12.815479 systemd[1466]: Startup finished in 154ms.
Oct  2 20:39:14.488079 waagent[1455]: 2023-10-02T20:39:14.487952Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2
Oct  2 20:39:14.494836 waagent[1455]: 2023-10-02T20:39:14.494752Z INFO Daemon Daemon OS: flatcar 3510.3.0
Oct  2 20:39:14.499775 waagent[1455]: 2023-10-02T20:39:14.499703Z INFO Daemon Daemon Python: 3.9.16
Oct  2 20:39:14.508365 waagent[1455]: 2023-10-02T20:39:14.504618Z INFO Daemon Daemon Run daemon
Oct  2 20:39:14.509550 waagent[1455]: 2023-10-02T20:39:14.509484Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0'
Oct  2 20:39:14.531430 waagent[1455]: 2023-10-02T20:39:14.531264Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Oct  2 20:39:14.547636 waagent[1455]: 2023-10-02T20:39:14.547492Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Oct  2 20:39:14.558795 waagent[1455]: 2023-10-02T20:39:14.558711Z INFO Daemon Daemon cloud-init is enabled: False
Oct  2 20:39:14.564422 waagent[1455]: 2023-10-02T20:39:14.564320Z INFO Daemon Daemon Using waagent for provisioning
Oct  2 20:39:14.571039 waagent[1455]: 2023-10-02T20:39:14.570967Z INFO Daemon Daemon Activate resource disk
Oct  2 20:39:14.576107 waagent[1455]: 2023-10-02T20:39:14.576040Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb
Oct  2 20:39:14.591056 waagent[1455]: 2023-10-02T20:39:14.590979Z INFO Daemon Daemon Found device: None
Oct  2 20:39:14.595700 waagent[1455]: 2023-10-02T20:39:14.595633Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology
Oct  2 20:39:14.604478 waagent[1455]: 2023-10-02T20:39:14.604412Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0
Oct  2 20:39:14.617022 waagent[1455]: 2023-10-02T20:39:14.616950Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Oct  2 20:39:14.623050 waagent[1455]: 2023-10-02T20:39:14.622985Z INFO Daemon Daemon Running default provisioning handler
Oct  2 20:39:14.640195 waagent[1455]: 2023-10-02T20:39:14.640059Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1.
Oct  2 20:39:14.655789 waagent[1455]: 2023-10-02T20:39:14.655656Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service'
Oct  2 20:39:14.665578 waagent[1455]: 2023-10-02T20:39:14.665504Z INFO Daemon Daemon cloud-init is enabled: False
Oct  2 20:39:14.670815 waagent[1455]: 2023-10-02T20:39:14.670751Z INFO Daemon Daemon Copying ovf-env.xml
Oct  2 20:39:14.724262 waagent[1455]: 2023-10-02T20:39:14.724112Z INFO Daemon Daemon Successfully mounted dvd
Oct  2 20:39:14.780226 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully.
Oct  2 20:39:14.795380 waagent[1455]: 2023-10-02T20:39:14.795226Z INFO Daemon Daemon Detect protocol endpoint
Oct  2 20:39:14.800761 waagent[1455]: 2023-10-02T20:39:14.800684Z INFO Daemon Daemon Clean protocol and wireserver endpoint
Oct  2 20:39:14.807840 waagent[1455]: 2023-10-02T20:39:14.807763Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler
Oct  2 20:39:14.814664 waagent[1455]: 2023-10-02T20:39:14.814594Z INFO Daemon Daemon Test for route to 168.63.129.16
Oct  2 20:39:14.821465 waagent[1455]: 2023-10-02T20:39:14.821344Z INFO Daemon Daemon Route to 168.63.129.16 exists
Oct  2 20:39:14.827046 waagent[1455]: 2023-10-02T20:39:14.826945Z INFO Daemon Daemon Wire server endpoint:168.63.129.16
Oct  2 20:39:14.878878 waagent[1455]: 2023-10-02T20:39:14.878810Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05
Oct  2 20:39:14.886302 waagent[1455]: 2023-10-02T20:39:14.886257Z INFO Daemon Daemon Wire protocol version:2012-11-30
Oct  2 20:39:14.891774 waagent[1455]: 2023-10-02T20:39:14.891714Z INFO Daemon Daemon Server preferred version:2015-04-05
Oct  2 20:39:15.483610 waagent[1455]: 2023-10-02T20:39:15.483449Z INFO Daemon Daemon Initializing goal state during protocol detection
Oct  2 20:39:15.498720 waagent[1455]: 2023-10-02T20:39:15.498642Z INFO Daemon Daemon Forcing an update of the goal state..
Oct  2 20:39:15.504877 waagent[1455]: 2023-10-02T20:39:15.504811Z INFO Daemon Daemon Fetching goal state [incarnation 1]
Oct  2 20:39:15.592672 waagent[1455]: 2023-10-02T20:39:15.592532Z INFO Daemon Daemon Found private key matching thumbprint BC078C24FDBEB88AD47DAC62D458606B794F1F31
Oct  2 20:39:15.601383 waagent[1455]: 2023-10-02T20:39:15.601277Z INFO Daemon Daemon Certificate with thumbprint 9119AACB82BB3A394B3963EF7377DD75C67E697C has no matching private key.
Oct  2 20:39:15.611070 waagent[1455]: 2023-10-02T20:39:15.610997Z INFO Daemon Daemon Fetch goal state completed
Oct  2 20:39:15.636777 waagent[1455]: 2023-10-02T20:39:15.636716Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 1c4599d6-ba9d-45d1-89ba-1b50c7f8af13 New eTag: 17215141085322173509]
Oct  2 20:39:15.647547 waagent[1455]: 2023-10-02T20:39:15.647474Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob
Oct  2 20:39:15.662563 waagent[1455]: 2023-10-02T20:39:15.662497Z INFO Daemon Daemon Starting provisioning
Oct  2 20:39:15.667757 waagent[1455]: 2023-10-02T20:39:15.667688Z INFO Daemon Daemon Handle ovf-env.xml.
Oct  2 20:39:15.673062 waagent[1455]: 2023-10-02T20:39:15.672997Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-c505880dad]
Oct  2 20:39:15.694684 waagent[1455]: 2023-10-02T20:39:15.694553Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-c505880dad]
Oct  2 20:39:15.701490 waagent[1455]: 2023-10-02T20:39:15.701413Z INFO Daemon Daemon Examine /proc/net/route for primary interface
Oct  2 20:39:15.708309 waagent[1455]: 2023-10-02T20:39:15.708245Z INFO Daemon Daemon Primary interface is [eth0]
Oct  2 20:39:15.729678 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully.
Oct  2 20:39:15.729845 systemd[1]: Stopped systemd-networkd-wait-online.service.
Oct  2 20:39:15.729909 systemd[1]: Stopping systemd-networkd-wait-online.service...
Oct  2 20:39:15.730151 systemd[1]: Stopping systemd-networkd.service...
Oct  2 20:39:15.736399 systemd-networkd[1234]: eth0: DHCPv6 lease lost
Oct  2 20:39:15.738080 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 20:39:15.738261 systemd[1]: Stopped systemd-networkd.service.
Oct  2 20:39:15.740235 systemd[1]: Starting systemd-networkd.service...
Oct  2 20:39:15.773656 systemd-networkd[1509]: enP12174s1: Link UP
Oct  2 20:39:15.773956 systemd-networkd[1509]: enP12174s1: Gained carrier
Oct  2 20:39:15.774951 systemd-networkd[1509]: eth0: Link UP
Oct  2 20:39:15.775039 systemd-networkd[1509]: eth0: Gained carrier
Oct  2 20:39:15.775447 systemd-networkd[1509]: lo: Link UP
Oct  2 20:39:15.775514 systemd-networkd[1509]: lo: Gained carrier
Oct  2 20:39:15.775824 systemd-networkd[1509]: eth0: Gained IPv6LL
Oct  2 20:39:15.777017 systemd-networkd[1509]: Enumeration completed
Oct  2 20:39:15.777220 systemd[1]: Started systemd-networkd.service.
Oct  2 20:39:15.778898 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 20:39:15.779190 systemd-networkd[1509]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 20:39:15.783234 waagent[1455]: 2023-10-02T20:39:15.782973Z INFO Daemon Daemon Create user account if not exists
Oct  2 20:39:15.790300 waagent[1455]: 2023-10-02T20:39:15.790213Z INFO Daemon Daemon User core already exists, skip useradd
Oct  2 20:39:15.797997 waagent[1455]: 2023-10-02T20:39:15.797901Z INFO Daemon Daemon Configure sudoer
Oct  2 20:39:15.803506 waagent[1455]: 2023-10-02T20:39:15.803347Z INFO Daemon Daemon Configure sshd
Oct  2 20:39:15.808474 systemd-networkd[1509]: eth0: DHCPv4 address 10.200.20.48/24, gateway 10.200.20.1 acquired from 168.63.129.16
Oct  2 20:39:15.809497 waagent[1455]: 2023-10-02T20:39:15.808311Z INFO Daemon Daemon Deploy ssh public key.
Oct  2 20:39:15.816986 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 20:39:17.023686 waagent[1455]: 2023-10-02T20:39:17.023616Z INFO Daemon Daemon Provisioning complete
Oct  2 20:39:17.046423 waagent[1455]: 2023-10-02T20:39:17.046333Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping
Oct  2 20:39:17.052912 waagent[1455]: 2023-10-02T20:39:17.052843Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions.
Oct  2 20:39:17.064059 waagent[1455]: 2023-10-02T20:39:17.063981Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent
Oct  2 20:39:17.370104 waagent[1518]: 2023-10-02T20:39:17.369947Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent
Oct  2 20:39:17.370843 waagent[1518]: 2023-10-02T20:39:17.370778Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:17.370977 waagent[1518]: 2023-10-02T20:39:17.370931Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:17.383416 waagent[1518]: 2023-10-02T20:39:17.383330Z INFO ExtHandler ExtHandler Forcing an update of the goal state..
Oct  2 20:39:17.383589 waagent[1518]: 2023-10-02T20:39:17.383535Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1]
Oct  2 20:39:17.466062 waagent[1518]: 2023-10-02T20:39:17.465914Z INFO ExtHandler ExtHandler Found private key matching thumbprint BC078C24FDBEB88AD47DAC62D458606B794F1F31
Oct  2 20:39:17.466280 waagent[1518]: 2023-10-02T20:39:17.466225Z INFO ExtHandler ExtHandler Certificate with thumbprint 9119AACB82BB3A394B3963EF7377DD75C67E697C has no matching private key.
Oct  2 20:39:17.466530 waagent[1518]: 2023-10-02T20:39:17.466478Z INFO ExtHandler ExtHandler Fetch goal state completed
Oct  2 20:39:17.479271 waagent[1518]: 2023-10-02T20:39:17.479216Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 26dacca7-a990-48ce-9c95-d57005e08533 New eTag: 17215141085322173509]
Oct  2 20:39:17.479906 waagent[1518]: 2023-10-02T20:39:17.479845Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob
Oct  2 20:39:17.522631 waagent[1518]: 2023-10-02T20:39:17.522498Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Oct  2 20:39:17.532574 waagent[1518]: 2023-10-02T20:39:17.532507Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1518
Oct  2 20:39:17.536281 waagent[1518]: 2023-10-02T20:39:17.536216Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk']
Oct  2 20:39:17.537629 waagent[1518]: 2023-10-02T20:39:17.537571Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct  2 20:39:17.574873 waagent[1518]: 2023-10-02T20:39:17.574803Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Oct  2 20:39:17.575260 waagent[1518]: 2023-10-02T20:39:17.575199Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Oct  2 20:39:17.585875 waagent[1518]: 2023-10-02T20:39:17.585808Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Oct  2 20:39:17.586389 waagent[1518]: 2023-10-02T20:39:17.586316Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Oct  2 20:39:17.587574 waagent[1518]: 2023-10-02T20:39:17.587509Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True]
Oct  2 20:39:17.588932 waagent[1518]: 2023-10-02T20:39:17.588857Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct  2 20:39:17.589613 waagent[1518]: 2023-10-02T20:39:17.589550Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:17.589871 waagent[1518]: 2023-10-02T20:39:17.589819Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:17.590601 waagent[1518]: 2023-10-02T20:39:17.590533Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct  2 20:39:17.591310 waagent[1518]: 2023-10-02T20:39:17.591233Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct  2 20:39:17.591827 waagent[1518]: 2023-10-02T20:39:17.591757Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:17.592080 waagent[1518]: 2023-10-02T20:39:17.592016Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct  2 20:39:17.592080 waagent[1518]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Oct  2 20:39:17.592080 waagent[1518]: eth0        00000000        0114C80A        0003        0        0        1024        00000000        0        0        0
Oct  2 20:39:17.592080 waagent[1518]: eth0        0014C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Oct  2 20:39:17.592080 waagent[1518]: eth0        0114C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:17.592080 waagent[1518]: eth0        10813FA8        0114C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:17.592080 waagent[1518]: eth0        FEA9FEA9        0114C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:17.592655 waagent[1518]: 2023-10-02T20:39:17.592558Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct  2 20:39:17.592731 waagent[1518]: 2023-10-02T20:39:17.592662Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct  2 20:39:17.593454 waagent[1518]: 2023-10-02T20:39:17.593355Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:17.595691 waagent[1518]: 2023-10-02T20:39:17.595539Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct  2 20:39:17.596674 waagent[1518]: 2023-10-02T20:39:17.596596Z INFO EnvHandler ExtHandler Configure routes
Oct  2 20:39:17.597107 waagent[1518]: 2023-10-02T20:39:17.597039Z INFO EnvHandler ExtHandler Gateway:None
Oct  2 20:39:17.597349 waagent[1518]: 2023-10-02T20:39:17.597277Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct  2 20:39:17.597517 waagent[1518]: 2023-10-02T20:39:17.597435Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct  2 20:39:17.597909 waagent[1518]: 2023-10-02T20:39:17.597828Z INFO EnvHandler ExtHandler Routes:None
Oct  2 20:39:17.612571 waagent[1518]: 2023-10-02T20:39:17.612275Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod)
Oct  2 20:39:17.613700 waagent[1518]: 2023-10-02T20:39:17.613594Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Oct  2 20:39:17.615740 waagent[1518]: 2023-10-02T20:39:17.615665Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders'
Oct  2 20:39:17.631628 waagent[1518]: 2023-10-02T20:39:17.631461Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1509'
Oct  2 20:39:17.642044 waagent[1518]: 2023-10-02T20:39:17.641928Z INFO MonitorHandler ExtHandler Network interfaces:
Oct  2 20:39:17.642044 waagent[1518]: Executing ['ip', '-a', '-o', 'link']:
Oct  2 20:39:17.642044 waagent[1518]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct  2 20:39:17.642044 waagent[1518]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:7d:4e:ed brd ff:ff:ff:ff:ff:ff
Oct  2 20:39:17.642044 waagent[1518]: 3: enP12174s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:7d:4e:ed brd ff:ff:ff:ff:ff:ff\    altname enP12174p0s2
Oct  2 20:39:17.642044 waagent[1518]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct  2 20:39:17.642044 waagent[1518]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct  2 20:39:17.642044 waagent[1518]: 2: eth0    inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\       valid_lft forever preferred_lft forever
Oct  2 20:39:17.642044 waagent[1518]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct  2 20:39:17.642044 waagent[1518]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct  2 20:39:17.642044 waagent[1518]: 2: eth0    inet6 fe80::222:48ff:fe7d:4eed/64 scope link \       valid_lft forever preferred_lft forever
Oct  2 20:39:17.656442 waagent[1518]: 2023-10-02T20:39:17.656380Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel.
Oct  2 20:39:17.798795 waagent[1518]: 2023-10-02T20:39:17.798720Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting
Oct  2 20:39:18.067849 waagent[1455]: 2023-10-02T20:39:18.067723Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running
Oct  2 20:39:18.071910 waagent[1455]: 2023-10-02T20:39:18.071853Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent
Oct  2 20:39:19.201467 waagent[1555]: 2023-10-02T20:39:19.201348Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1)
Oct  2 20:39:19.202506 waagent[1555]: 2023-10-02T20:39:19.202446Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0
Oct  2 20:39:19.202736 waagent[1555]: 2023-10-02T20:39:19.202688Z INFO ExtHandler ExtHandler Python: 3.9.16
Oct  2 20:39:19.213654 waagent[1555]: 2023-10-02T20:39:19.213553Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1;
Oct  2 20:39:19.214142 waagent[1555]: 2023-10-02T20:39:19.214087Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:19.214437 waagent[1555]: 2023-10-02T20:39:19.214352Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:19.227270 waagent[1555]: 2023-10-02T20:39:19.227199Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1]
Oct  2 20:39:19.236285 waagent[1555]: 2023-10-02T20:39:19.236221Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143
Oct  2 20:39:19.237558 waagent[1555]: 2023-10-02T20:39:19.237496Z INFO ExtHandler
Oct  2 20:39:19.237821 waagent[1555]: 2023-10-02T20:39:19.237768Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 80e5b386-f627-4966-8e44-a9ebdeee7fa9 eTag: 17215141085322173509 source: Fabric]
Oct  2 20:39:19.238854 waagent[1555]: 2023-10-02T20:39:19.238770Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them.
Oct  2 20:39:19.241153 waagent[1555]: 2023-10-02T20:39:19.241083Z INFO ExtHandler
Oct  2 20:39:19.241479 waagent[1555]: 2023-10-02T20:39:19.241411Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1]
Oct  2 20:39:19.248604 waagent[1555]: 2023-10-02T20:39:19.248538Z INFO ExtHandler ExtHandler Downloading artifacts profile blob
Oct  2 20:39:19.249315 waagent[1555]: 2023-10-02T20:39:19.249248Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required
Oct  2 20:39:19.270673 waagent[1555]: 2023-10-02T20:39:19.270586Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel.
Oct  2 20:39:19.358129 waagent[1555]: 2023-10-02T20:39:19.357979Z INFO ExtHandler Downloaded certificate {'thumbprint': 'BC078C24FDBEB88AD47DAC62D458606B794F1F31', 'hasPrivateKey': True}
Oct  2 20:39:19.359446 waagent[1555]: 2023-10-02T20:39:19.359381Z INFO ExtHandler Downloaded certificate {'thumbprint': '9119AACB82BB3A394B3963EF7377DD75C67E697C', 'hasPrivateKey': False}
Oct  2 20:39:19.360680 waagent[1555]: 2023-10-02T20:39:19.360614Z INFO ExtHandler Fetch goal state completed
Oct  2 20:39:19.386660 waagent[1555]: 2023-10-02T20:39:19.386586Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1555
Oct  2 20:39:19.390397 waagent[1555]: 2023-10-02T20:39:19.390299Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk']
Oct  2 20:39:19.392016 waagent[1555]: 2023-10-02T20:39:19.391950Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules
Oct  2 20:39:19.399394 waagent[1555]: 2023-10-02T20:39:19.399317Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service
Oct  2 20:39:19.399920 waagent[1555]: 2023-10-02T20:39:19.399859Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup
Oct  2 20:39:19.412170 waagent[1555]: 2023-10-02T20:39:19.412109Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now
Oct  2 20:39:19.412832 waagent[1555]: 2023-10-02T20:39:19.412772Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service'
Oct  2 20:39:19.421909 waagent[1555]: 2023-10-02T20:39:19.421807Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up.
Oct  2 20:39:19.425677 waagent[1555]: 2023-10-02T20:39:19.425618Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True]
Oct  2 20:39:19.427296 waagent[1555]: 2023-10-02T20:39:19.427225Z INFO ExtHandler ExtHandler Starting env monitor service.
Oct  2 20:39:19.427583 waagent[1555]: 2023-10-02T20:39:19.427506Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:19.428009 waagent[1555]: 2023-10-02T20:39:19.427944Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:19.428995 waagent[1555]: 2023-10-02T20:39:19.428921Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled.
Oct  2 20:39:19.429304 waagent[1555]: 2023-10-02T20:39:19.429242Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route:
Oct  2 20:39:19.429304 waagent[1555]: Iface        Destination        Gateway         Flags        RefCnt        Use        Metric        Mask                MTU        Window        IRTT
Oct  2 20:39:19.429304 waagent[1555]: eth0        00000000        0114C80A        0003        0        0        1024        00000000        0        0        0
Oct  2 20:39:19.429304 waagent[1555]: eth0        0014C80A        00000000        0001        0        0        1024        00FFFFFF        0        0        0
Oct  2 20:39:19.429304 waagent[1555]: eth0        0114C80A        00000000        0005        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:19.429304 waagent[1555]: eth0        10813FA8        0114C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:19.429304 waagent[1555]: eth0        FEA9FEA9        0114C80A        0007        0        0        1024        FFFFFFFF        0        0        0
Oct  2 20:39:19.431911 waagent[1555]: 2023-10-02T20:39:19.431735Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service.
Oct  2 20:39:19.432155 waagent[1555]: 2023-10-02T20:39:19.432075Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file
Oct  2 20:39:19.433051 waagent[1555]: 2023-10-02T20:39:19.432979Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16
Oct  2 20:39:19.433712 waagent[1555]: 2023-10-02T20:39:19.433461Z INFO EnvHandler ExtHandler Configure routes
Oct  2 20:39:19.433874 waagent[1555]: 2023-10-02T20:39:19.433812Z INFO EnvHandler ExtHandler Gateway:None
Oct  2 20:39:19.433992 waagent[1555]: 2023-10-02T20:39:19.433941Z INFO EnvHandler ExtHandler Routes:None
Oct  2 20:39:19.436681 waagent[1555]: 2023-10-02T20:39:19.436509Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread
Oct  2 20:39:19.436843 waagent[1555]: 2023-10-02T20:39:19.436754Z INFO ExtHandler ExtHandler Start Extension Telemetry service.
Oct  2 20:39:19.441152 waagent[1555]: 2023-10-02T20:39:19.441067Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status.
Oct  2 20:39:19.442840 waagent[1555]: 2023-10-02T20:39:19.440805Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True
Oct  2 20:39:19.443093 waagent[1555]: 2023-10-02T20:39:19.443028Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread
Oct  2 20:39:19.459935 waagent[1555]: 2023-10-02T20:39:19.459783Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod)
Oct  2 20:39:19.465444 waagent[1555]: 2023-10-02T20:39:19.465338Z INFO MonitorHandler ExtHandler Network interfaces:
Oct  2 20:39:19.465444 waagent[1555]: Executing ['ip', '-a', '-o', 'link']:
Oct  2 20:39:19.465444 waagent[1555]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
Oct  2 20:39:19.465444 waagent[1555]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:7d:4e:ed brd ff:ff:ff:ff:ff:ff
Oct  2 20:39:19.465444 waagent[1555]: 3: enP12174s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\    link/ether 00:22:48:7d:4e:ed brd ff:ff:ff:ff:ff:ff\    altname enP12174p0s2
Oct  2 20:39:19.465444 waagent[1555]: Executing ['ip', '-4', '-a', '-o', 'address']:
Oct  2 20:39:19.465444 waagent[1555]: 1: lo    inet 127.0.0.1/8 scope host lo\       valid_lft forever preferred_lft forever
Oct  2 20:39:19.465444 waagent[1555]: 2: eth0    inet 10.200.20.48/24 metric 1024 brd 10.200.20.255 scope global eth0\       valid_lft forever preferred_lft forever
Oct  2 20:39:19.465444 waagent[1555]: Executing ['ip', '-6', '-a', '-o', 'address']:
Oct  2 20:39:19.465444 waagent[1555]: 1: lo    inet6 ::1/128 scope host \       valid_lft forever preferred_lft forever
Oct  2 20:39:19.465444 waagent[1555]: 2: eth0    inet6 fe80::222:48ff:fe7d:4eed/64 scope link \       valid_lft forever preferred_lft forever
Oct  2 20:39:19.465846 waagent[1555]: 2023-10-02T20:39:19.465737Z INFO ExtHandler ExtHandler Downloading manifest
Oct  2 20:39:19.544879 waagent[1555]: 2023-10-02T20:39:19.544810Z INFO ExtHandler ExtHandler
Oct  2 20:39:19.545385 waagent[1555]: 2023-10-02T20:39:19.545311Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: dd79773b-5f61-4886-b371-fb4c700a5768 correlation 9ed7e658-9fac-45a2-99c9-2b036c16e5c2 created: 2023-10-02T20:38:20.440292Z]
Oct  2 20:39:19.547512 waagent[1555]: 2023-10-02T20:39:19.547445Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything.
Oct  2 20:39:19.549497 waagent[1555]: 2023-10-02T20:39:19.549428Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms]
Oct  2 20:39:19.577591 waagent[1555]: 2023-10-02T20:39:19.577460Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules:
Oct  2 20:39:19.577591 waagent[1555]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.577591 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.577591 waagent[1555]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.577591 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.577591 waagent[1555]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.577591 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.577591 waagent[1555]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        tcp dpt:53
Oct  2 20:39:19.577591 waagent[1555]:        3     2533 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Oct  2 20:39:19.577591 waagent[1555]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Oct  2 20:39:19.580874 waagent[1555]: 2023-10-02T20:39:19.580799Z INFO ExtHandler ExtHandler Looking for existing remote access users.
Oct  2 20:39:19.597265 waagent[1555]: 2023-10-02T20:39:19.597129Z INFO EnvHandler ExtHandler Current Firewall rules:
Oct  2 20:39:19.597265 waagent[1555]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.597265 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.597265 waagent[1555]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.597265 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.597265 waagent[1555]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
Oct  2 20:39:19.597265 waagent[1555]:     pkts      bytes target     prot opt in     out     source               destination
Oct  2 20:39:19.597265 waagent[1555]:        0        0 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        tcp dpt:53
Oct  2 20:39:19.597265 waagent[1555]:        5     2637 ACCEPT     tcp  --  *      *       0.0.0.0/0            168.63.129.16        owner UID match 0
Oct  2 20:39:19.597265 waagent[1555]:        0        0 DROP       tcp  --  *      *       0.0.0.0/0            168.63.129.16        ctstate INVALID,NEW
Oct  2 20:39:19.597826 waagent[1555]: 2023-10-02T20:39:19.597769Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300
Oct  2 20:39:19.601559 waagent[1555]: 2023-10-02T20:39:19.601488Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A1BE16E4-4CC2-4640-8DC7-12A7F934DA26;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1]
Oct  2 20:39:55.578340 kernel: hv_balloon: Max. dynamic memory size: 4096 MB
Oct  2 20:39:56.934111 update_engine[1368]: I1002 20:39:56.933699  1368 update_attempter.cc:505] Updating boot flags...
Oct  2 20:39:57.072680 systemd[1]: Created slice system-sshd.slice.
Oct  2 20:39:57.074137 systemd[1]: Started sshd@0-10.200.20.48:22-10.200.12.6:38894.service.
Oct  2 20:39:57.547708 sshd[1641]: Accepted publickey for core from 10.200.12.6 port 38894 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:39:57.555127 sshd[1641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:39:57.559073 systemd-logind[1363]: New session 3 of user core.
Oct  2 20:39:57.559887 systemd[1]: Started session-3.scope.
Oct  2 20:39:57.917968 systemd[1]: Started sshd@1-10.200.20.48:22-10.200.12.6:56140.service.
Oct  2 20:39:58.372643 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 56140 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:39:58.374425 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:39:58.378765 systemd-logind[1363]: New session 4 of user core.
Oct  2 20:39:58.379205 systemd[1]: Started session-4.scope.
Oct  2 20:39:58.704568 sshd[1646]: pam_unix(sshd:session): session closed for user core
Oct  2 20:39:58.707785 systemd[1]: sshd@1-10.200.20.48:22-10.200.12.6:56140.service: Deactivated successfully.
Oct  2 20:39:58.708526 systemd[1]: session-4.scope: Deactivated successfully.
Oct  2 20:39:58.709074 systemd-logind[1363]: Session 4 logged out. Waiting for processes to exit.
Oct  2 20:39:58.710078 systemd-logind[1363]: Removed session 4.
Oct  2 20:39:58.775570 systemd[1]: Started sshd@2-10.200.20.48:22-10.200.12.6:56150.service.
Oct  2 20:39:59.197869 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 56150 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:39:59.199514 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:39:59.203438 systemd-logind[1363]: New session 5 of user core.
Oct  2 20:39:59.204050 systemd[1]: Started session-5.scope.
Oct  2 20:39:59.501034 sshd[1652]: pam_unix(sshd:session): session closed for user core
Oct  2 20:39:59.504041 systemd[1]: sshd@2-10.200.20.48:22-10.200.12.6:56150.service: Deactivated successfully.
Oct  2 20:39:59.504754 systemd[1]: session-5.scope: Deactivated successfully.
Oct  2 20:39:59.505294 systemd-logind[1363]: Session 5 logged out. Waiting for processes to exit.
Oct  2 20:39:59.506090 systemd-logind[1363]: Removed session 5.
Oct  2 20:39:59.571239 systemd[1]: Started sshd@3-10.200.20.48:22-10.200.12.6:56164.service.
Oct  2 20:39:59.987063 sshd[1658]: Accepted publickey for core from 10.200.12.6 port 56164 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:39:59.988950 sshd[1658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:39:59.992772 systemd-logind[1363]: New session 6 of user core.
Oct  2 20:39:59.993198 systemd[1]: Started session-6.scope.
Oct  2 20:40:00.293892 sshd[1658]: pam_unix(sshd:session): session closed for user core
Oct  2 20:40:00.296990 systemd-logind[1363]: Session 6 logged out. Waiting for processes to exit.
Oct  2 20:40:00.297079 systemd[1]: session-6.scope: Deactivated successfully.
Oct  2 20:40:00.297641 systemd[1]: sshd@3-10.200.20.48:22-10.200.12.6:56164.service: Deactivated successfully.
Oct  2 20:40:00.298660 systemd-logind[1363]: Removed session 6.
Oct  2 20:40:00.364063 systemd[1]: Started sshd@4-10.200.20.48:22-10.200.12.6:56168.service.
Oct  2 20:40:00.782247 sshd[1664]: Accepted publickey for core from 10.200.12.6 port 56168 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:40:00.784145 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:40:00.787919 systemd-logind[1363]: New session 7 of user core.
Oct  2 20:40:00.788335 systemd[1]: Started session-7.scope.
Oct  2 20:40:01.097950 sudo[1667]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Oct  2 20:40:01.098371 sudo[1667]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 20:40:01.119518 dbus-daemon[1348]: avc:  received setenforce notice (enforcing=1)
Oct  2 20:40:01.120592 sudo[1667]: pam_unix(sudo:session): session closed for user root
Oct  2 20:40:01.191737 sshd[1664]: pam_unix(sshd:session): session closed for user core
Oct  2 20:40:01.195427 systemd-logind[1363]: Session 7 logged out. Waiting for processes to exit.
Oct  2 20:40:01.195904 systemd[1]: session-7.scope: Deactivated successfully.
Oct  2 20:40:01.196783 systemd[1]: sshd@4-10.200.20.48:22-10.200.12.6:56168.service: Deactivated successfully.
Oct  2 20:40:01.197794 systemd-logind[1363]: Removed session 7.
Oct  2 20:40:01.263089 systemd[1]: Started sshd@5-10.200.20.48:22-10.200.12.6:56182.service.
Oct  2 20:40:01.686879 sshd[1671]: Accepted publickey for core from 10.200.12.6 port 56182 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:40:01.688718 sshd[1671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:40:01.693423 systemd[1]: Started session-8.scope.
Oct  2 20:40:01.693750 systemd-logind[1363]: New session 8 of user core.
Oct  2 20:40:01.930589 sudo[1675]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Oct  2 20:40:01.930796 sudo[1675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 20:40:01.934322 sudo[1675]: pam_unix(sudo:session): session closed for user root
Oct  2 20:40:01.940831 sudo[1674]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Oct  2 20:40:01.941401 sudo[1674]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 20:40:01.953614 systemd[1]: Stopping audit-rules.service...
Oct  2 20:40:01.955000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 20:40:01.961018 kernel: kauditd_printk_skb: 36 callbacks suppressed
Oct  2 20:40:01.961071 kernel: audit: type=1305 audit(1696279201.955:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 20:40:01.955000 audit[1678]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcd3951c0 a2=420 a3=0 items=0 ppid=1 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:01.972938 auditctl[1678]: No rules
Oct  2 20:40:01.998820 kernel: audit: type=1300 audit(1696279201.955:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcd3951c0 a2=420 a3=0 items=0 ppid=1 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:01.998892 kernel: audit: type=1327 audit(1696279201.955:169): proctitle=2F7362696E2F617564697463746C002D44
Oct  2 20:40:01.955000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Oct  2 20:40:01.973456 systemd[1]: audit-rules.service: Deactivated successfully.
Oct  2 20:40:01.973647 systemd[1]: Stopped audit-rules.service.
Oct  2 20:40:01.996994 systemd[1]: Starting audit-rules.service...
Oct  2 20:40:01.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.023603 kernel: audit: type=1131 audit(1696279201.971:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.039348 augenrules[1695]: No rules
Oct  2 20:40:02.040252 systemd[1]: Finished audit-rules.service.
Oct  2 20:40:02.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.041561 sudo[1674]: pam_unix(sudo:session): session closed for user root
Oct  2 20:40:02.040000 audit[1674]: USER_END pid=1674 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.077279 kernel: audit: type=1130 audit(1696279202.039:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.077340 kernel: audit: type=1106 audit(1696279202.040:172): pid=1674 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.040000 audit[1674]: CRED_DISP pid=1674 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.094113 kernel: audit: type=1104 audit(1696279202.040:173): pid=1674 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.122576 sshd[1671]: pam_unix(sshd:session): session closed for user core
Oct  2 20:40:02.122000 audit[1671]: USER_END pid=1671 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.125484 systemd[1]: session-8.scope: Deactivated successfully.
Oct  2 20:40:02.126167 systemd[1]: sshd@5-10.200.20.48:22-10.200.12.6:56182.service: Deactivated successfully.
Oct  2 20:40:02.122000 audit[1671]: CRED_DISP pid=1671 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.165528 kernel: audit: type=1106 audit(1696279202.122:174): pid=1671 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.165605 kernel: audit: type=1104 audit(1696279202.122:175): pid=1671 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.48:22-10.200.12.6:56182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.165678 systemd-logind[1363]: Session 8 logged out. Waiting for processes to exit.
Oct  2 20:40:02.183900 kernel: audit: type=1131 audit(1696279202.123:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.48:22-10.200.12.6:56182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.184345 systemd-logind[1363]: Removed session 8.
Oct  2 20:40:02.198220 systemd[1]: Started sshd@6-10.200.20.48:22-10.200.12.6:56186.service.
Oct  2 20:40:02.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.12.6:56186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.651000 audit[1701]: USER_ACCT pid=1701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.652673 sshd[1701]: Accepted publickey for core from 10.200.12.6 port 56186 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:40:02.652000 audit[1701]: CRED_ACQ pid=1701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.652000 audit[1701]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa479970 a2=3 a3=1 items=0 ppid=1 pid=1701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:02.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:40:02.654571 sshd[1701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:40:02.658955 systemd[1]: Started session-9.scope.
Oct  2 20:40:02.660206 systemd-logind[1363]: New session 9 of user core.
Oct  2 20:40:02.663000 audit[1701]: USER_START pid=1701 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.665000 audit[1703]: CRED_ACQ pid=1703 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:02.910000 audit[1704]: USER_ACCT pid=1704 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.912407 sudo[1704]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Oct  2 20:40:02.911000 audit[1704]: CRED_REFR pid=1704 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:02.912936 sudo[1704]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 20:40:02.913000 audit[1704]: USER_START pid=1704 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:03.513441 systemd[1]: Starting docker.service...
Oct  2 20:40:03.560157 env[1719]: time="2023-10-02T20:40:03.560102045Z" level=info msg="Starting up"
Oct  2 20:40:03.561823 env[1719]: time="2023-10-02T20:40:03.561798179Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 20:40:03.561915 env[1719]: time="2023-10-02T20:40:03.561902779Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 20:40:03.562007 env[1719]: time="2023-10-02T20:40:03.561990980Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 20:40:03.562064 env[1719]: time="2023-10-02T20:40:03.562052781Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 20:40:03.564586 env[1719]: time="2023-10-02T20:40:03.564562840Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 20:40:03.564686 env[1719]: time="2023-10-02T20:40:03.564672841Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 20:40:03.564749 env[1719]: time="2023-10-02T20:40:03.564735801Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 20:40:03.564804 env[1719]: time="2023-10-02T20:40:03.564793122Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 20:40:03.756333 env[1719]: time="2023-10-02T20:40:03.756289614Z" level=info msg="Loading containers: start."
Oct  2 20:40:03.804000 audit[1747]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.804000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd2024c70 a2=0 a3=1 items=0 ppid=1719 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Oct  2 20:40:03.808000 audit[1749]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.808000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc91983c0 a2=0 a3=1 items=0 ppid=1719 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.808000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Oct  2 20:40:03.811000 audit[1751]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.811000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd9bfb330 a2=0 a3=1 items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 20:40:03.814000 audit[1753]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.814000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff45fc0b0 a2=0 a3=1 items=0 ppid=1719 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 20:40:03.817000 audit[1755]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.817000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd4c89120 a2=0 a3=1 items=0 ppid=1719 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Oct  2 20:40:03.820000 audit[1757]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.820000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd3156220 a2=0 a3=1 items=0 ppid=1719 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Oct  2 20:40:03.843000 audit[1759]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.843000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe66bc5f0 a2=0 a3=1 items=0 ppid=1719 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.843000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Oct  2 20:40:03.846000 audit[1761]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.846000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffef12f100 a2=0 a3=1 items=0 ppid=1719 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.846000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Oct  2 20:40:03.849000 audit[1763]: NETFILTER_CFG table=filter:16 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.849000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdff2d9d0 a2=0 a3=1 items=0 ppid=1719 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 20:40:03.871000 audit[1767]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_unregister_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.871000 audit[1767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff9d27c00 a2=0 a3=1 items=0 ppid=1719 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 20:40:03.873000 audit[1768]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.873000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe58b4250 a2=0 a3=1 items=0 ppid=1719 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 20:40:03.892373 kernel: Initializing XFRM netlink socket
Oct  2 20:40:03.908832 env[1719]: time="2023-10-02T20:40:03.908799522Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Oct  2 20:40:03.940000 audit[1776]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.940000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffffd5afd0 a2=0 a3=1 items=0 ppid=1719 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Oct  2 20:40:03.955000 audit[1779]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.955000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe4e8a3d0 a2=0 a3=1 items=0 ppid=1719 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Oct  2 20:40:03.960000 audit[1782]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.960000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc7334e50 a2=0 a3=1 items=0 ppid=1719 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Oct  2 20:40:03.963000 audit[1784]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.963000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd1406f80 a2=0 a3=1 items=0 ppid=1719 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Oct  2 20:40:03.966000 audit[1786]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.966000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdba0e8d0 a2=0 a3=1 items=0 ppid=1719 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Oct  2 20:40:03.969000 audit[1788]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.969000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc2577dc0 a2=0 a3=1 items=0 ppid=1719 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Oct  2 20:40:03.972000 audit[1790]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.972000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffde3d36a0 a2=0 a3=1 items=0 ppid=1719 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Oct  2 20:40:03.976000 audit[1792]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.976000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffb7d68e0 a2=0 a3=1 items=0 ppid=1719 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Oct  2 20:40:03.979000 audit[1794]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.979000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd4258c50 a2=0 a3=1 items=0 ppid=1719 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 20:40:03.982000 audit[1796]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.982000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffde874db0 a2=0 a3=1 items=0 ppid=1719 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 20:40:03.985000 audit[1798]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:03.985000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe7ce7510 a2=0 a3=1 items=0 ppid=1719 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:03.985000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Oct  2 20:40:03.987299 systemd-networkd[1509]: docker0: Link UP
Oct  2 20:40:04.007000 audit[1802]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_unregister_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:04.007000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeddc2870 a2=0 a3=1 items=0 ppid=1719 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:04.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 20:40:04.009000 audit[1803]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:04.009000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffde9af320 a2=0 a3=1 items=0 ppid=1719 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:04.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 20:40:04.011151 env[1719]: time="2023-10-02T20:40:04.011125635Z" level=info msg="Loading containers: done."
Oct  2 20:40:04.023739 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1787367246-merged.mount: Deactivated successfully.
Oct  2 20:40:04.111062 env[1719]: time="2023-10-02T20:40:04.110966524Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Oct  2 20:40:04.111461 env[1719]: time="2023-10-02T20:40:04.111442488Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Oct  2 20:40:04.111651 env[1719]: time="2023-10-02T20:40:04.111635369Z" level=info msg="Daemon has completed initialization"
Oct  2 20:40:04.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:04.150460 systemd[1]: Started docker.service.
Oct  2 20:40:04.157400 env[1719]: time="2023-10-02T20:40:04.157304023Z" level=info msg="API listen on /run/docker.sock"
Oct  2 20:40:04.181231 systemd[1]: Reloading.
Oct  2 20:40:04.270043 /usr/lib/systemd/system-generators/torcx-generator[1850]: time="2023-10-02T20:40:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 20:40:04.270072 /usr/lib/systemd/system-generators/torcx-generator[1850]: time="2023-10-02T20:40:04Z" level=info msg="torcx already run"
Oct  2 20:40:04.382692 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 20:40:04.382710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 20:40:04.398025 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit: BPF prog-id=35 op=LOAD
Oct  2 20:40:04.462000 audit: BPF prog-id=24 op=UNLOAD
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit: BPF prog-id=36 op=LOAD
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.462000 audit: BPF prog-id=37 op=LOAD
Oct  2 20:40:04.462000 audit: BPF prog-id=25 op=UNLOAD
Oct  2 20:40:04.462000 audit: BPF prog-id=26 op=UNLOAD
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.463000 audit: BPF prog-id=38 op=LOAD
Oct  2 20:40:04.463000 audit: BPF prog-id=28 op=UNLOAD
Oct  2 20:40:04.464000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.464000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.465000 audit: BPF prog-id=39 op=LOAD
Oct  2 20:40:04.465000 audit: BPF prog-id=32 op=UNLOAD
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit: BPF prog-id=40 op=LOAD
Oct  2 20:40:04.466000 audit: BPF prog-id=29 op=UNLOAD
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit: BPF prog-id=41 op=LOAD
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.466000 audit: BPF prog-id=42 op=LOAD
Oct  2 20:40:04.466000 audit: BPF prog-id=30 op=UNLOAD
Oct  2 20:40:04.466000 audit: BPF prog-id=31 op=UNLOAD
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit: BPF prog-id=43 op=LOAD
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit: BPF prog-id=44 op=LOAD
Oct  2 20:40:04.467000 audit: BPF prog-id=21 op=UNLOAD
Oct  2 20:40:04.467000 audit: BPF prog-id=22 op=UNLOAD
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.467000 audit: BPF prog-id=45 op=LOAD
Oct  2 20:40:04.467000 audit: BPF prog-id=27 op=UNLOAD
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.468000 audit: BPF prog-id=46 op=LOAD
Oct  2 20:40:04.468000 audit: BPF prog-id=34 op=UNLOAD
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit: BPF prog-id=47 op=LOAD
Oct  2 20:40:04.469000 audit: BPF prog-id=18 op=UNLOAD
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit: BPF prog-id=48 op=LOAD
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:04.469000 audit: BPF prog-id=49 op=LOAD
Oct  2 20:40:04.469000 audit: BPF prog-id=19 op=UNLOAD
Oct  2 20:40:04.469000 audit: BPF prog-id=20 op=UNLOAD
Oct  2 20:40:04.479186 systemd[1]: Started kubelet.service.
Oct  2 20:40:04.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:04.574709 kubelet[1909]: E1002 20:40:04.574639    1909 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Oct  2 20:40:04.576899 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 20:40:04.577023 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 20:40:04.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 20:40:05.740758 env[1379]: time="2023-10-02T20:40:05.740655533Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\""
Oct  2 20:40:06.626758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount393172676.mount: Deactivated successfully.
Oct  2 20:40:10.775958 env[1379]: time="2023-10-02T20:40:10.775891814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:10.783390 env[1379]: time="2023-10-02T20:40:10.783335931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:10.788031 env[1379]: time="2023-10-02T20:40:10.788001554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:10.792754 env[1379]: time="2023-10-02T20:40:10.792717537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:10.793498 env[1379]: time="2023-10-02T20:40:10.793472021Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:30bb499447fe1bc655853e2e8ac386cdeb28c80263536259cb54f290f9a58d6c\""
Oct  2 20:40:10.807957 env[1379]: time="2023-10-02T20:40:10.807915773Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\""
Oct  2 20:40:14.541617 env[1379]: time="2023-10-02T20:40:14.541559408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:14.551144 env[1379]: time="2023-10-02T20:40:14.551098641Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:14.558021 env[1379]: time="2023-10-02T20:40:14.557979671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:14.563511 env[1379]: time="2023-10-02T20:40:14.563477538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:14.564188 env[1379]: time="2023-10-02T20:40:14.564158603Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:89d57b83c17862d0ca2dd214e9e5ad425f8d67ecba32d10b846f8d22d3b5597c\""
Oct  2 20:40:14.579123 env[1379]: time="2023-10-02T20:40:14.579084578Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\""
Oct  2 20:40:14.755336 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Oct  2 20:40:14.755547 systemd[1]: Stopped kubelet.service.
Oct  2 20:40:14.777599 kernel: kauditd_printk_skb: 258 callbacks suppressed
Oct  2 20:40:14.777709 kernel: audit: type=1130 audit(1696279214.754:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.757087 systemd[1]: Started kubelet.service.
Oct  2 20:40:14.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.796461 kernel: audit: type=1131 audit(1696279214.754:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.814773 kernel: audit: type=1130 audit(1696279214.755:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:14.852657 kubelet[1943]: E1002 20:40:14.852616    1943 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Oct  2 20:40:14.855081 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 20:40:14.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 20:40:14.855207 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 20:40:14.874413 kernel: audit: type=1131 audit(1696279214.854:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 20:40:16.809397 env[1379]: time="2023-10-02T20:40:16.809321640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:16.819456 env[1379]: time="2023-10-02T20:40:16.819416312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:16.827314 env[1379]: time="2023-10-02T20:40:16.827281288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:16.833886 env[1379]: time="2023-10-02T20:40:16.833849371Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:16.834621 env[1379]: time="2023-10-02T20:40:16.834589230Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:64fc40cee3716a4596d219b360ce536adb7998eaeae3f5dbb774d6503f5039d7\""
Oct  2 20:40:16.849920 env[1379]: time="2023-10-02T20:40:16.849868837Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\""
Oct  2 20:40:17.940540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3353033172.mount: Deactivated successfully.
Oct  2 20:40:19.032050 env[1379]: time="2023-10-02T20:40:19.032004128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.041065 env[1379]: time="2023-10-02T20:40:19.041024456Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.046900 env[1379]: time="2023-10-02T20:40:19.046854618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.051433 env[1379]: time="2023-10-02T20:40:19.051403731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.051759 env[1379]: time="2023-10-02T20:40:19.051727682Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:7da62c127fc0f2c3473babe4dd0fe1da874278c4e524a490b1781e3e0e6dddfa\""
Oct  2 20:40:19.066780 env[1379]: time="2023-10-02T20:40:19.066743446Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Oct  2 20:40:19.785848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1200780473.mount: Deactivated successfully.
Oct  2 20:40:19.821703 env[1379]: time="2023-10-02T20:40:19.821662723Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.835137 env[1379]: time="2023-10-02T20:40:19.835100960Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.844028 env[1379]: time="2023-10-02T20:40:19.843989004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.850560 env[1379]: time="2023-10-02T20:40:19.850512856Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:19.851104 env[1379]: time="2023-10-02T20:40:19.851068703Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\""
Oct  2 20:40:19.865983 env[1379]: time="2023-10-02T20:40:19.865943346Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\""
Oct  2 20:40:25.005290 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2.
Oct  2 20:40:25.005502 systemd[1]: Stopped kubelet.service.
Oct  2 20:40:25.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.007024 systemd[1]: Started kubelet.service.
Oct  2 20:40:25.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.043321 kernel: audit: type=1130 audit(1696279225.004:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.043464 kernel: audit: type=1131 audit(1696279225.004:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.062575 kernel: audit: type=1130 audit(1696279225.004:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:25.129206 kubelet[1964]: E1002 20:40:25.129146    1964 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Oct  2 20:40:25.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 20:40:25.131518 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 20:40:25.131640 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 20:40:25.150385 kernel: audit: type=1131 audit(1696279225.130:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 20:40:27.417595 env[1379]: time="2023-10-02T20:40:27.417534586Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:27.426380 env[1379]: time="2023-10-02T20:40:27.426322048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:27.433728 env[1379]: time="2023-10-02T20:40:27.433697183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:27.440105 env[1379]: time="2023-10-02T20:40:27.440078536Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:27.440870 env[1379]: time="2023-10-02T20:40:27.440833409Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\""
Oct  2 20:40:27.454958 env[1379]: time="2023-10-02T20:40:27.454932861Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\""
Oct  2 20:40:28.326981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3554623404.mount: Deactivated successfully.
Oct  2 20:40:28.950019 env[1379]: time="2023-10-02T20:40:28.949958183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:28.960037 env[1379]: time="2023-10-02T20:40:28.959997908Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:28.964737 env[1379]: time="2023-10-02T20:40:28.964698899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:28.970765 env[1379]: time="2023-10-02T20:40:28.970721086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:28.971005 env[1379]: time="2023-10-02T20:40:28.970977191Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\""
Oct  2 20:40:33.961996 systemd[1]: Stopped kubelet.service.
Oct  2 20:40:33.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:33.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:33.997876 kernel: audit: type=1130 audit(1696279233.962:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:33.998002 kernel: audit: type=1131 audit(1696279233.962:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:34.024778 systemd[1]: Reloading.
Oct  2 20:40:34.075956 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2023-10-02T20:40:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 20:40:34.078481 /usr/lib/systemd/system-generators/torcx-generator[2061]: time="2023-10-02T20:40:34Z" level=info msg="torcx already run"
Oct  2 20:40:34.229871 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 20:40:34.230419 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 20:40:34.245671 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 20:40:34.313000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.350445 kernel: audit: type=1400 audit(1696279234.313:395): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.350543 kernel: audit: type=1400 audit(1696279234.316:396): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.350579 kernel: audit: type=1400 audit(1696279234.316:397): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.386570 kernel: audit: type=1400 audit(1696279234.316:398): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.404796 kernel: audit: type=1400 audit(1696279234.316:399): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.422324 kernel: audit: type=1400 audit(1696279234.316:400): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445104 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 20:40:34.445232 kernel: audit: type=1400 audit(1696279234.316:401): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.316000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit: BPF prog-id=50 op=LOAD
Oct  2 20:40:34.330000 audit: BPF prog-id=35 op=UNLOAD
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.330000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit: BPF prog-id=51 op=LOAD
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.349000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit: BPF prog-id=52 op=LOAD
Oct  2 20:40:34.367000 audit: BPF prog-id=36 op=UNLOAD
Oct  2 20:40:34.367000 audit: BPF prog-id=37 op=UNLOAD
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.367000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit: BPF prog-id=53 op=LOAD
Oct  2 20:40:34.385000 audit: BPF prog-id=38 op=UNLOAD
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.385000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit: BPF prog-id=54 op=LOAD
Oct  2 20:40:34.403000 audit: BPF prog-id=39 op=UNLOAD
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.403000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.421000 audit: BPF prog-id=55 op=LOAD
Oct  2 20:40:34.421000 audit: BPF prog-id=40 op=UNLOAD
Oct  2 20:40:34.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit: BPF prog-id=58 op=LOAD
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.444000 audit: BPF prog-id=59 op=LOAD
Oct  2 20:40:34.444000 audit: BPF prog-id=43 op=UNLOAD
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit: BPF prog-id=60 op=LOAD
Oct  2 20:40:34.445000 audit: BPF prog-id=45 op=UNLOAD
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.445000 audit: BPF prog-id=61 op=LOAD
Oct  2 20:40:34.445000 audit: BPF prog-id=46 op=UNLOAD
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit: BPF prog-id=62 op=LOAD
Oct  2 20:40:34.446000 audit: BPF prog-id=47 op=UNLOAD
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit: BPF prog-id=63 op=LOAD
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.446000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.447000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:34.447000 audit: BPF prog-id=64 op=LOAD
Oct  2 20:40:34.447000 audit: BPF prog-id=48 op=UNLOAD
Oct  2 20:40:34.447000 audit: BPF prog-id=49 op=UNLOAD
Oct  2 20:40:34.475228 systemd[1]: Started kubelet.service.
Oct  2 20:40:34.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:34.546410 kubelet[2121]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 20:40:34.546410 kubelet[2121]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 20:40:34.546410 kubelet[2121]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 20:40:34.546790 kubelet[2121]: I1002 20:40:34.546529    2121 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 20:40:35.696919 kubelet[2121]: I1002 20:40:35.696880    2121 server.go:467] "Kubelet version" kubeletVersion="v1.28.1"
Oct  2 20:40:35.696919 kubelet[2121]: I1002 20:40:35.696911    2121 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 20:40:35.697261 kubelet[2121]: I1002 20:40:35.697104    2121 server.go:895] "Client rotation is on, will bootstrap in background"
Oct  2 20:40:35.701714 kubelet[2121]: E1002 20:40:35.701695    2121 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.48:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.701906 kubelet[2121]: I1002 20:40:35.701893    2121 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 20:40:35.706405 kubelet[2121]: W1002 20:40:35.706390    2121 machine.go:65] Cannot read vendor id correctly, set empty.
Oct  2 20:40:35.707073 kubelet[2121]: I1002 20:40:35.707054    2121 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 20:40:35.707634 kubelet[2121]: I1002 20:40:35.707620    2121 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 20:40:35.707884 kubelet[2121]: I1002 20:40:35.707857    2121 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Oct  2 20:40:35.708053 kubelet[2121]: I1002 20:40:35.708038    2121 topology_manager.go:138] "Creating topology manager with none policy"
Oct  2 20:40:35.708116 kubelet[2121]: I1002 20:40:35.708107    2121 container_manager_linux.go:301] "Creating device plugin manager"
Oct  2 20:40:35.708266 kubelet[2121]: I1002 20:40:35.708252    2121 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 20:40:35.708651 kubelet[2121]: I1002 20:40:35.708635    2121 kubelet.go:393] "Attempting to sync node with API server"
Oct  2 20:40:35.708732 kubelet[2121]: I1002 20:40:35.708722    2121 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 20:40:35.708792 kubelet[2121]: I1002 20:40:35.708783    2121 kubelet.go:309] "Adding apiserver pod source"
Oct  2 20:40:35.708891 kubelet[2121]: I1002 20:40:35.708880    2121 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 20:40:35.709702 kubelet[2121]: W1002 20:40:35.709662    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-c505880dad&limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.709827 kubelet[2121]: E1002 20:40:35.709814    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-c505880dad&limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.710299 kubelet[2121]: I1002 20:40:35.710282    2121 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 20:40:35.710773 kubelet[2121]: W1002 20:40:35.710756    2121 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Oct  2 20:40:35.711436 kubelet[2121]: I1002 20:40:35.711421    2121 server.go:1232] "Started kubelet"
Oct  2 20:40:35.711619 kubelet[2121]: W1002 20:40:35.711589    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.711698 kubelet[2121]: E1002 20:40:35.711688    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.713614 kubelet[2121]: E1002 20:40:35.713161    2121 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-c505880dad.178a64fa44721905", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-c505880dad", UID:"ci-3510.3.0-a-c505880dad", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-c505880dad"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 40, 35, 711342853, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 40, 35, 711342853, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.0-a-c505880dad"}': 'Post "https://10.200.20.48:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.48:6443: connect: connection refused'(may retry after sleeping)
Oct  2 20:40:35.713614 kubelet[2121]: I1002 20:40:35.713345    2121 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 20:40:35.713614 kubelet[2121]: I1002 20:40:35.713616    2121 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Oct  2 20:40:35.713786 kubelet[2121]: I1002 20:40:35.713657    2121 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 20:40:35.712000 audit[2121]: AVC avc:  denied  { mac_admin } for  pid=2121 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:35.712000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:35.712000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009fb2c0 a1=4000c583a8 a2=40009fb290 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.712000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:35.714338 kubelet[2121]: I1002 20:40:35.714307    2121 server.go:462] "Adding debug handlers to kubelet server"
Oct  2 20:40:35.714463 kubelet[2121]: I1002 20:40:35.714448    2121 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 20:40:35.713000 audit[2121]: AVC avc:  denied  { mac_admin } for  pid=2121 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:35.713000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:35.713000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005cdaa0 a1=4000c583c0 a2=40009fb350 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.713000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:35.714790 kubelet[2121]: I1002 20:40:35.714779    2121 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 20:40:35.714913 kubelet[2121]: I1002 20:40:35.714901    2121 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 20:40:35.715227 kubelet[2121]: E1002 20:40:35.715204    2121 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 20:40:35.715227 kubelet[2121]: E1002 20:40:35.715230    2121 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 20:40:35.717641 kubelet[2121]: I1002 20:40:35.716880    2121 volume_manager.go:291] "Starting Kubelet Volume Manager"
Oct  2 20:40:35.717641 kubelet[2121]: I1002 20:40:35.716962    2121 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 20:40:35.717641 kubelet[2121]: I1002 20:40:35.717015    2121 reconciler_new.go:29] "Reconciler: start to sync state"
Oct  2 20:40:35.717641 kubelet[2121]: W1002 20:40:35.717263    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.717641 kubelet[2121]: E1002 20:40:35.717298    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.717641 kubelet[2121]: E1002 20:40:35.717576    2121 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-c505880dad?timeout=10s\": dial tcp 10.200.20.48:6443: connect: connection refused" interval="200ms"
Oct  2 20:40:35.722000 audit[2131]: NETFILTER_CFG table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.722000 audit[2131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde57e6c0 a2=0 a3=1 items=0 ppid=2121 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 20:40:35.724000 audit[2132]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.724000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaf07490 a2=0 a3=1 items=0 ppid=2121 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 20:40:35.729000 audit[2134]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.729000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffffa83f00 a2=0 a3=1 items=0 ppid=2121 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 20:40:35.734000 audit[2137]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.734000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe7469290 a2=0 a3=1 items=0 ppid=2121 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 20:40:35.754000 audit[2143]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.754000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd60988a0 a2=0 a3=1 items=0 ppid=2121 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Oct  2 20:40:35.756806 kubelet[2121]: I1002 20:40:35.756784    2121 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Oct  2 20:40:35.756000 audit[2144]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:35.756000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffda3d1ed0 a2=0 a3=1 items=0 ppid=2121 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 20:40:35.758922 kubelet[2121]: I1002 20:40:35.758891    2121 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Oct  2 20:40:35.758992 kubelet[2121]: I1002 20:40:35.758952    2121 status_manager.go:217] "Starting to sync pod status with apiserver"
Oct  2 20:40:35.758992 kubelet[2121]: I1002 20:40:35.758973    2121 kubelet.go:2303] "Starting kubelet main sync loop"
Oct  2 20:40:35.759041 kubelet[2121]: E1002 20:40:35.759018    2121 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 20:40:35.759000 audit[2145]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.759000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe04d88a0 a2=0 a3=1 items=0 ppid=2121 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 20:40:35.759000 audit[2146]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:35.759000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca248520 a2=0 a3=1 items=0 ppid=2121 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 20:40:35.762035 kubelet[2121]: W1002 20:40:35.761993    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.763432 kubelet[2121]: E1002 20:40:35.763404    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:35.764536 kubelet[2121]: I1002 20:40:35.764510    2121 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 20:40:35.764633 kubelet[2121]: I1002 20:40:35.764622    2121 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 20:40:35.764707 kubelet[2121]: I1002 20:40:35.764698    2121 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 20:40:35.764000 audit[2149]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.764000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd08b760 a2=0 a3=1 items=0 ppid=2121 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 20:40:35.767000 audit[2151]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:35.767000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe987dd50 a2=0 a3=1 items=0 ppid=2121 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 20:40:35.767000 audit[2150]: NETFILTER_CFG table=nat:42 family=10 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:35.767000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe1b92200 a2=0 a3=1 items=0 ppid=2121 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 20:40:35.769000 audit[2152]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:35.769000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffde9ad00 a2=0 a3=1 items=0 ppid=2121 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 20:40:35.772449 kubelet[2121]: I1002 20:40:35.772419    2121 policy_none.go:49] "None policy: Start"
Oct  2 20:40:35.773239 kubelet[2121]: I1002 20:40:35.773209    2121 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 20:40:35.773239 kubelet[2121]: I1002 20:40:35.773238    2121 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 20:40:35.781427 systemd[1]: Created slice kubepods.slice.
Oct  2 20:40:35.786291 systemd[1]: Created slice kubepods-burstable.slice.
Oct  2 20:40:35.789102 systemd[1]: Created slice kubepods-besteffort.slice.
Oct  2 20:40:35.796852 kubelet[2121]: I1002 20:40:35.796818    2121 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 20:40:35.795000 audit[2121]: AVC avc:  denied  { mac_admin } for  pid=2121 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:35.795000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:35.795000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b03a40 a1=4000edecd8 a2=4000b03a10 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:35.795000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:35.797093 kubelet[2121]: I1002 20:40:35.796887    2121 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 20:40:35.797093 kubelet[2121]: I1002 20:40:35.797070    2121 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 20:40:35.799241 kubelet[2121]: E1002 20:40:35.799162    2121 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-c505880dad\" not found"
Oct  2 20:40:35.819280 kubelet[2121]: I1002 20:40:35.819254    2121 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.819811 kubelet[2121]: E1002 20:40:35.819783    2121 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.48:6443/api/v1/nodes\": dial tcp 10.200.20.48:6443: connect: connection refused" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.859884 kubelet[2121]: I1002 20:40:35.859851    2121 topology_manager.go:215] "Topology Admit Handler" podUID="bffc04f2827b4beb463b626d42bec6aa" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.861823 kubelet[2121]: I1002 20:40:35.861805    2121 topology_manager.go:215] "Topology Admit Handler" podUID="70a538b324029fea7b9965b9d7a2e124" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.866890 systemd[1]: Created slice kubepods-burstable-podbffc04f2827b4beb463b626d42bec6aa.slice.
Oct  2 20:40:35.867793 kubelet[2121]: I1002 20:40:35.867775    2121 topology_manager.go:215] "Topology Admit Handler" podUID="71596ec737060020bef1f068f498885c" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.875344 systemd[1]: Created slice kubepods-burstable-pod70a538b324029fea7b9965b9d7a2e124.slice.
Oct  2 20:40:35.879544 systemd[1]: Created slice kubepods-burstable-pod71596ec737060020bef1f068f498885c.slice.
Oct  2 20:40:35.918285 kubelet[2121]: I1002 20:40:35.918252    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.918514 kubelet[2121]: I1002 20:40:35.918497    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.918615 kubelet[2121]: I1002 20:40:35.918603    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.918709 kubelet[2121]: I1002 20:40:35.918699    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.918813 kubelet[2121]: I1002 20:40:35.918801    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.918925 kubelet[2121]: I1002 20:40:35.918914    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/71596ec737060020bef1f068f498885c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-c505880dad\" (UID: \"71596ec737060020bef1f068f498885c\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.919079 kubelet[2121]: E1002 20:40:35.918456    2121 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-c505880dad?timeout=10s\": dial tcp 10.200.20.48:6443: connect: connection refused" interval="400ms"
Oct  2 20:40:35.919179 kubelet[2121]: I1002 20:40:35.919053    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.919278 kubelet[2121]: I1002 20:40:35.919267    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:35.919454 kubelet[2121]: I1002 20:40:35.919432    2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:36.021592 kubelet[2121]: I1002 20:40:36.021558    2121 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:36.022018 kubelet[2121]: E1002 20:40:36.021998    2121 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.48:6443/api/v1/nodes\": dial tcp 10.200.20.48:6443: connect: connection refused" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:36.174516 env[1379]: time="2023-10-02T20:40:36.174457189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-c505880dad,Uid:bffc04f2827b4beb463b626d42bec6aa,Namespace:kube-system,Attempt:0,}"
Oct  2 20:40:36.179548 env[1379]: time="2023-10-02T20:40:36.179509868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-c505880dad,Uid:70a538b324029fea7b9965b9d7a2e124,Namespace:kube-system,Attempt:0,}"
Oct  2 20:40:36.182378 env[1379]: time="2023-10-02T20:40:36.182322418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-c505880dad,Uid:71596ec737060020bef1f068f498885c,Namespace:kube-system,Attempt:0,}"
Oct  2 20:40:36.320443 kubelet[2121]: E1002 20:40:36.320307    2121 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-c505880dad?timeout=10s\": dial tcp 10.200.20.48:6443: connect: connection refused" interval="800ms"
Oct  2 20:40:36.423606 kubelet[2121]: I1002 20:40:36.423541    2121 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:36.424133 kubelet[2121]: E1002 20:40:36.424109    2121 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.48:6443/api/v1/nodes\": dial tcp 10.200.20.48:6443: connect: connection refused" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:36.575289 kubelet[2121]: W1002 20:40:36.575169    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-c505880dad&limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:36.575289 kubelet[2121]: E1002 20:40:36.575228    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-c505880dad&limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:36.693165 kubelet[2121]: W1002 20:40:36.693126    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:36.693165 kubelet[2121]: E1002 20:40:36.693167    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:36.908343 kubelet[2121]: W1002 20:40:36.908224    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:36.908343 kubelet[2121]: E1002 20:40:36.908281    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:37.112562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1548036571.mount: Deactivated successfully.
Oct  2 20:40:37.121589 kubelet[2121]: E1002 20:40:37.121550    2121 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-c505880dad?timeout=10s\": dial tcp 10.200.20.48:6443: connect: connection refused" interval="1.6s"
Oct  2 20:40:37.207894 env[1379]: time="2023-10-02T20:40:37.207770065Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.214560 env[1379]: time="2023-10-02T20:40:37.214512478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.225874 kubelet[2121]: I1002 20:40:37.225845    2121 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:37.226194 kubelet[2121]: E1002 20:40:37.226173    2121 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.48:6443/api/v1/nodes\": dial tcp 10.200.20.48:6443: connect: connection refused" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:37.230710 env[1379]: time="2023-10-02T20:40:37.230671771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.241968 kubelet[2121]: W1002 20:40:37.241911    2121 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:37.242050 kubelet[2121]: E1002 20:40:37.241977    2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.48:6443: connect: connection refused
Oct  2 20:40:37.269662 env[1379]: time="2023-10-02T20:40:37.269595434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.280144 env[1379]: time="2023-10-02T20:40:37.280093529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.294481 env[1379]: time="2023-10-02T20:40:37.294435851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.301387 env[1379]: time="2023-10-02T20:40:37.301326839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.310592 env[1379]: time="2023-10-02T20:40:37.310550471Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.319179 env[1379]: time="2023-10-02T20:40:37.319141250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.327743 env[1379]: time="2023-10-02T20:40:37.327710954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.350871 env[1379]: time="2023-10-02T20:40:37.350819585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.401851 env[1379]: time="2023-10-02T20:40:37.401809356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:40:37.432576 env[1379]: time="2023-10-02T20:40:37.432500378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:40:37.432576 env[1379]: time="2023-10-02T20:40:37.432544971Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:40:37.432757 env[1379]: time="2023-10-02T20:40:37.432555809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:40:37.432951 env[1379]: time="2023-10-02T20:40:37.432880154Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91c6779d49373cd8a75236ed3dc0bb4179efef87515b37abdeafc5e89167d742 pid=2159 runtime=io.containerd.runc.v2
Oct  2 20:40:37.461750 systemd[1]: Started cri-containerd-91c6779d49373cd8a75236ed3dc0bb4179efef87515b37abdeafc5e89167d742.scope.
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.482000 audit: BPF prog-id=65 op=LOAD
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931633637373964343933373363643861373532333665643364633062
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931633637373964343933373363643861373532333665643364633062
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit: BPF prog-id=66 op=LOAD
Oct  2 20:40:37.483000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931633637373964343933373363643861373532333665643364633062
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit: BPF prog-id=67 op=LOAD
Oct  2 20:40:37.483000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931633637373964343933373363643861373532333665643364633062
Oct  2 20:40:37.483000 audit: BPF prog-id=67 op=UNLOAD
Oct  2 20:40:37.483000 audit: BPF prog-id=66 op=UNLOAD
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { perfmon } for  pid=2171 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit[2171]: AVC avc:  denied  { bpf } for  pid=2171 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.483000 audit: BPF prog-id=68 op=LOAD
Oct  2 20:40:37.483000 audit[2171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931633637373964343933373363643861373532333665643364633062
Oct  2 20:40:37.486915 env[1379]: time="2023-10-02T20:40:37.486826942Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:40:37.486915 env[1379]: time="2023-10-02T20:40:37.486890651Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:40:37.487069 env[1379]: time="2023-10-02T20:40:37.486901329Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:40:37.487145 env[1379]: time="2023-10-02T20:40:37.487079179Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966 pid=2195 runtime=io.containerd.runc.v2
Oct  2 20:40:37.509097 systemd[1]: Started cri-containerd-63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966.scope.
Oct  2 20:40:37.523855 env[1379]: time="2023-10-02T20:40:37.523815334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-c505880dad,Uid:bffc04f2827b4beb463b626d42bec6aa,Namespace:kube-system,Attempt:0,} returns sandbox id \"91c6779d49373cd8a75236ed3dc0bb4179efef87515b37abdeafc5e89167d742\""
Oct  2 20:40:37.527427 env[1379]: time="2023-10-02T20:40:37.527388046Z" level=info msg="CreateContainer within sandbox \"91c6779d49373cd8a75236ed3dc0bb4179efef87515b37abdeafc5e89167d742\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.532000 audit: BPF prog-id=69 op=LOAD
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363131663964633563306231323635353736663161393838613862
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363131663964633563306231323635353736663161393838613862
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.533000 audit: BPF prog-id=70 op=LOAD
Oct  2 20:40:37.533000 audit[2205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363131663964633563306231323635353736663161393838613862
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.534000 audit: BPF prog-id=71 op=LOAD
Oct  2 20:40:37.534000 audit[2205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363131663964633563306231323635353736663161393838613862
Oct  2 20:40:37.534000 audit: BPF prog-id=71 op=UNLOAD
Oct  2 20:40:37.534000 audit: BPF prog-id=70 op=UNLOAD
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { perfmon } for  pid=2205 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit[2205]: AVC avc:  denied  { bpf } for  pid=2205 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.535000 audit: BPF prog-id=72 op=LOAD
Oct  2 20:40:37.535000 audit[2205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2195 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633363131663964633563306231323635353736663161393838613862
Oct  2 20:40:37.541664 env[1379]: time="2023-10-02T20:40:37.532798766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:40:37.541664 env[1379]: time="2023-10-02T20:40:37.532835800Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:40:37.541664 env[1379]: time="2023-10-02T20:40:37.532845398Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:40:37.541664 env[1379]: time="2023-10-02T20:40:37.532972817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e pid=2236 runtime=io.containerd.runc.v2
Oct  2 20:40:37.553478 systemd[1]: Started cri-containerd-64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e.scope.
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.582000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.583000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.583000 audit: BPF prog-id=73 op=LOAD
Oct  2 20:40:37.585638 env[1379]: time="2023-10-02T20:40:37.585599950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-c505880dad,Uid:70a538b324029fea7b9965b9d7a2e124,Namespace:kube-system,Attempt:0,} returns sandbox id \"63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966\""
Oct  2 20:40:37.585000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.588429 env[1379]: time="2023-10-02T20:40:37.588396994Z" level=info msg="CreateContainer within sandbox \"63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Oct  2 20:40:37.585000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2236 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623034313339313335663939343532656433616239316262356538
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2236 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623034313339313335663939343532656433616239316262356538
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.587000 audit: BPF prog-id=74 op=LOAD
Oct  2 20:40:37.587000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2236 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623034313339313335663939343532656433616239316262356538
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.589000 audit: BPF prog-id=75 op=LOAD
Oct  2 20:40:37.589000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2236 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623034313339313335663939343532656433616239316262356538
Oct  2 20:40:37.590000 audit: BPF prog-id=75 op=UNLOAD
Oct  2 20:40:37.590000 audit: BPF prog-id=74 op=UNLOAD
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { perfmon } for  pid=2246 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit[2246]: AVC avc:  denied  { bpf } for  pid=2246 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.590000 audit: BPF prog-id=76 op=LOAD
Oct  2 20:40:37.590000 audit[2246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2236 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623034313339313335663939343532656433616239316262356538
Oct  2 20:40:37.603987 env[1379]: time="2023-10-02T20:40:37.603922915Z" level=info msg="CreateContainer within sandbox \"91c6779d49373cd8a75236ed3dc0bb4179efef87515b37abdeafc5e89167d742\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"718e4ee8bf327d37d771999c40f74268793253cd348e1d637fef81943f4280b5\""
Oct  2 20:40:37.604609 env[1379]: time="2023-10-02T20:40:37.604550768Z" level=info msg="StartContainer for \"718e4ee8bf327d37d771999c40f74268793253cd348e1d637fef81943f4280b5\""
Oct  2 20:40:37.617874 env[1379]: time="2023-10-02T20:40:37.617819832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-c505880dad,Uid:71596ec737060020bef1f068f498885c,Namespace:kube-system,Attempt:0,} returns sandbox id \"64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e\""
Oct  2 20:40:37.620286 env[1379]: time="2023-10-02T20:40:37.620256978Z" level=info msg="CreateContainer within sandbox \"64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Oct  2 20:40:37.634320 systemd[1]: Started cri-containerd-718e4ee8bf327d37d771999c40f74268793253cd348e1d637fef81943f4280b5.scope.
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.655000 audit: BPF prog-id=77 op=LOAD
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2159 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386534656538626633323764333764373731393939633430663734
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2159 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386534656538626633323764333764373731393939633430663734
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.656000 audit: BPF prog-id=78 op=LOAD
Oct  2 20:40:37.656000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2159 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386534656538626633323764333764373731393939633430663734
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.657000 audit: BPF prog-id=79 op=LOAD
Oct  2 20:40:37.657000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2159 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386534656538626633323764333764373731393939633430663734
Oct  2 20:40:37.658000 audit: BPF prog-id=79 op=UNLOAD
Oct  2 20:40:37.658000 audit: BPF prog-id=78 op=UNLOAD
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { perfmon } for  pid=2287 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit[2287]: AVC avc:  denied  { bpf } for  pid=2287 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.658000 audit: BPF prog-id=80 op=LOAD
Oct  2 20:40:37.658000 audit[2287]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2159 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386534656538626633323764333764373731393939633430663734
Oct  2 20:40:37.696290 env[1379]: time="2023-10-02T20:40:37.696190788Z" level=info msg="StartContainer for \"718e4ee8bf327d37d771999c40f74268793253cd348e1d637fef81943f4280b5\" returns successfully"
Oct  2 20:40:37.708573 env[1379]: time="2023-10-02T20:40:37.708506214Z" level=info msg="CreateContainer within sandbox \"63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8\""
Oct  2 20:40:37.709777 env[1379]: time="2023-10-02T20:40:37.709595469Z" level=info msg="StartContainer for \"759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8\""
Oct  2 20:40:37.720484 env[1379]: time="2023-10-02T20:40:37.720204505Z" level=info msg="CreateContainer within sandbox \"64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00\""
Oct  2 20:40:37.728075 env[1379]: time="2023-10-02T20:40:37.728042013Z" level=info msg="StartContainer for \"9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00\""
Oct  2 20:40:37.751433 systemd[1]: Started cri-containerd-759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8.scope.
Oct  2 20:40:37.781457 systemd[1]: Started cri-containerd-9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00.scope.
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.787000 audit: BPF prog-id=81 op=LOAD
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2195 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396230303835666239393465633336323636313163333336346566
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2195 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396230303835666239393465633336323636313163333336346566
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit: BPF prog-id=82 op=LOAD
Oct  2 20:40:37.788000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2195 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396230303835666239393465633336323636313163333336346566
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit: BPF prog-id=83 op=LOAD
Oct  2 20:40:37.788000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2195 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396230303835666239393465633336323636313163333336346566
Oct  2 20:40:37.788000 audit: BPF prog-id=83 op=UNLOAD
Oct  2 20:40:37.788000 audit: BPF prog-id=82 op=UNLOAD
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { perfmon } for  pid=2323 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit[2323]: AVC avc:  denied  { bpf } for  pid=2323 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.788000 audit: BPF prog-id=84 op=LOAD
Oct  2 20:40:37.788000 audit[2323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2195 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735396230303835666239393465633336323636313163333336346566
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.801000 audit: BPF prog-id=85 op=LOAD
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2236 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333963306133613934333230373334326264623431613732613030
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2236 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333963306133613934333230373334326264623431613732613030
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit: BPF prog-id=86 op=LOAD
Oct  2 20:40:37.802000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2236 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333963306133613934333230373334326264623431613732613030
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit: BPF prog-id=87 op=LOAD
Oct  2 20:40:37.802000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2236 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333963306133613934333230373334326264623431613732613030
Oct  2 20:40:37.802000 audit: BPF prog-id=87 op=UNLOAD
Oct  2 20:40:37.802000 audit: BPF prog-id=86 op=UNLOAD
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { perfmon } for  pid=2338 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit[2338]: AVC avc:  denied  { bpf } for  pid=2338 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:37.802000 audit: BPF prog-id=88 op=LOAD
Oct  2 20:40:37.802000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2236 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:37.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333963306133613934333230373334326264623431613732613030
Oct  2 20:40:37.836253 env[1379]: time="2023-10-02T20:40:37.836206544Z" level=info msg="StartContainer for \"759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8\" returns successfully"
Oct  2 20:40:37.873530 env[1379]: time="2023-10-02T20:40:37.873479727Z" level=info msg="StartContainer for \"9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00\" returns successfully"
Oct  2 20:40:38.828305 kubelet[2121]: I1002 20:40:38.828279    2121 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:40.012396 kernel: kauditd_printk_skb: 597 callbacks suppressed
Oct  2 20:40:40.012560 kernel: audit: type=1400 audit(1696279239.984:670): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:39.984000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:39.984000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000fb6300 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.058537 kernel: audit: type=1300 audit(1696279239.984:670): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000fb6300 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:39.984000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.092662 kernel: audit: type=1327 audit(1696279239.984:670): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.013000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.115261 kernel: audit: type=1400 audit(1696279240.013:671): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.013000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400155c500 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.144161 kernel: audit: type=1300 audit(1696279240.013:671): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400155c500 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.181414 kernel: audit: type=1327 audit(1696279240.013:671): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.013000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.204887 kernel: audit: type=1400 audit(1696279240.013:672): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.013000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000fb6630 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.265258 kernel: audit: type=1300 audit(1696279240.013:672): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4000fb6630 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.265440 kernel: audit: type=1327 audit(1696279240.013:672): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.064000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.296331 kernel: audit: type=1400 audit(1696279240.064:673): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.064000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4003fed170 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.064000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.260000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.260000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=40047a8a40 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.260000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:40.260000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4003ed7b60 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:40:40.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:40:40.344569 kubelet[2121]: E1002 20:40:40.344530    2121 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-c505880dad\" not found" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:40.362060 kubelet[2121]: I1002 20:40:40.361998    2121 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:40.711867 kubelet[2121]: I1002 20:40:40.711767    2121 apiserver.go:52] "Watching apiserver"
Oct  2 20:40:40.717629 kubelet[2121]: I1002 20:40:40.717598    2121 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 20:40:41.056000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:41.056000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40008fc000 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:41.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:41.057000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:41.057000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001108040 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:41.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:42.192315 kubelet[2121]: W1002 20:40:42.192289    2121 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:42.357376 kubelet[2121]: W1002 20:40:42.357323    2121 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:43.074795 systemd[1]: Reloading.
Oct  2 20:40:43.193244 /usr/lib/systemd/system-generators/torcx-generator[2408]: time="2023-10-02T20:40:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 20:40:43.198498 /usr/lib/systemd/system-generators/torcx-generator[2408]: time="2023-10-02T20:40:43Z" level=info msg="torcx already run"
Oct  2 20:40:43.311901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 20:40:43.311923 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 20:40:43.328002 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.408000 audit: BPF prog-id=89 op=LOAD
Oct  2 20:40:43.408000 audit: BPF prog-id=81 op=UNLOAD
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.409000 audit: BPF prog-id=90 op=LOAD
Oct  2 20:40:43.409000 audit: BPF prog-id=85 op=UNLOAD
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.410000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit: BPF prog-id=91 op=LOAD
Oct  2 20:40:43.411000 audit: BPF prog-id=50 op=UNLOAD
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit: BPF prog-id=92 op=LOAD
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.411000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit: BPF prog-id=93 op=LOAD
Oct  2 20:40:43.412000 audit: BPF prog-id=51 op=UNLOAD
Oct  2 20:40:43.412000 audit: BPF prog-id=52 op=UNLOAD
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.412000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.413000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.413000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.413000 audit: BPF prog-id=94 op=LOAD
Oct  2 20:40:43.413000 audit: BPF prog-id=69 op=UNLOAD
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.414000 audit: BPF prog-id=95 op=LOAD
Oct  2 20:40:43.414000 audit: BPF prog-id=53 op=UNLOAD
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.415000 audit: BPF prog-id=96 op=LOAD
Oct  2 20:40:43.415000 audit: BPF prog-id=73 op=UNLOAD
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.417000 audit: BPF prog-id=97 op=LOAD
Oct  2 20:40:43.417000 audit: BPF prog-id=54 op=UNLOAD
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.418000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit: BPF prog-id=98 op=LOAD
Oct  2 20:40:43.419000 audit: BPF prog-id=55 op=UNLOAD
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.419000 audit: BPF prog-id=99 op=LOAD
Oct  2 20:40:43.419000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.420000 audit: BPF prog-id=100 op=LOAD
Oct  2 20:40:43.420000 audit: BPF prog-id=56 op=UNLOAD
Oct  2 20:40:43.420000 audit: BPF prog-id=57 op=UNLOAD
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit: BPF prog-id=101 op=LOAD
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit: BPF prog-id=102 op=LOAD
Oct  2 20:40:43.422000 audit: BPF prog-id=58 op=UNLOAD
Oct  2 20:40:43.422000 audit: BPF prog-id=59 op=UNLOAD
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.422000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit: BPF prog-id=103 op=LOAD
Oct  2 20:40:43.423000 audit: BPF prog-id=60 op=UNLOAD
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.423000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.424000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.424000 audit: BPF prog-id=104 op=LOAD
Oct  2 20:40:43.424000 audit: BPF prog-id=65 op=UNLOAD
Oct  2 20:40:43.424000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.424000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.425000 audit: BPF prog-id=105 op=LOAD
Oct  2 20:40:43.425000 audit: BPF prog-id=61 op=UNLOAD
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.426000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit: BPF prog-id=106 op=LOAD
Oct  2 20:40:43.427000 audit: BPF prog-id=62 op=UNLOAD
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit: BPF prog-id=107 op=LOAD
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit: BPF prog-id=108 op=LOAD
Oct  2 20:40:43.427000 audit: BPF prog-id=63 op=UNLOAD
Oct  2 20:40:43.427000 audit: BPF prog-id=64 op=UNLOAD
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.427000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.428000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.428000 audit: BPF prog-id=109 op=LOAD
Oct  2 20:40:43.428000 audit: BPF prog-id=77 op=UNLOAD
Oct  2 20:40:43.451259 kubelet[2121]: I1002 20:40:43.449133    2121 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 20:40:43.451762 systemd[1]: Stopping kubelet.service...
Oct  2 20:40:43.471092 systemd[1]: kubelet.service: Deactivated successfully.
Oct  2 20:40:43.471506 systemd[1]: Stopped kubelet.service.
Oct  2 20:40:43.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:43.471783 systemd[1]: kubelet.service: Consumed 1.518s CPU time.
Oct  2 20:40:43.474215 systemd[1]: Started kubelet.service.
Oct  2 20:40:43.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:43.576091 kubelet[2468]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 20:40:43.576499 kubelet[2468]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 20:40:43.576549 kubelet[2468]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 20:40:43.576726 kubelet[2468]: I1002 20:40:43.576690    2468 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 20:40:43.583571 kubelet[2468]: I1002 20:40:43.583487    2468 server.go:467] "Kubelet version" kubeletVersion="v1.28.1"
Oct  2 20:40:43.583722 kubelet[2468]: I1002 20:40:43.583710    2468 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 20:40:43.583950 kubelet[2468]: I1002 20:40:43.583935    2468 server.go:895] "Client rotation is on, will bootstrap in background"
Oct  2 20:40:43.585564 kubelet[2468]: I1002 20:40:43.585544    2468 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Oct  2 20:40:43.588159 kubelet[2468]: I1002 20:40:43.588130    2468 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 20:40:43.593024 kubelet[2468]: W1002 20:40:43.593009    2468 machine.go:65] Cannot read vendor id correctly, set empty.
Oct  2 20:40:43.593767 kubelet[2468]: I1002 20:40:43.593739    2468 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 20:40:43.594158 kubelet[2468]: I1002 20:40:43.594146    2468 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 20:40:43.594403 kubelet[2468]: I1002 20:40:43.594386    2468 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Oct  2 20:40:43.594561 kubelet[2468]: I1002 20:40:43.594548    2468 topology_manager.go:138] "Creating topology manager with none policy"
Oct  2 20:40:43.594624 kubelet[2468]: I1002 20:40:43.594615    2468 container_manager_linux.go:301] "Creating device plugin manager"
Oct  2 20:40:43.594695 kubelet[2468]: I1002 20:40:43.594686    2468 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 20:40:43.596181 kubelet[2468]: I1002 20:40:43.596165    2468 kubelet.go:393] "Attempting to sync node with API server"
Oct  2 20:40:43.596283 kubelet[2468]: I1002 20:40:43.596273    2468 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 20:40:43.600601 kubelet[2468]: I1002 20:40:43.600580    2468 kubelet.go:309] "Adding apiserver pod source"
Oct  2 20:40:43.600782 kubelet[2468]: I1002 20:40:43.600773    2468 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 20:40:43.605027 kubelet[2468]: I1002 20:40:43.605008    2468 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 20:40:43.605871 kubelet[2468]: I1002 20:40:43.605853    2468 server.go:1232] "Started kubelet"
Oct  2 20:40:43.607000 audit[2468]: AVC avc:  denied  { mac_admin } for  pid=2468 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:43.607000 audit[2468]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d4c510 a1=4000af10c8 a2=4000d4c4e0 a3=25 items=0 ppid=1 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:43.607000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:43.608885 kubelet[2468]: I1002 20:40:43.608870    2468 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 20:40:43.607000 audit[2468]: AVC avc:  denied  { mac_admin } for  pid=2468 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:43.607000 audit[2468]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b06c00 a1=4000af10e0 a2=4000d4c5a0 a3=25 items=0 ppid=1 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:43.607000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:43.609594 kubelet[2468]: I1002 20:40:43.609582    2468 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 20:40:43.609665 kubelet[2468]: I1002 20:40:43.609657    2468 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 20:40:43.615491 kubelet[2468]: E1002 20:40:43.615475    2468 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 20:40:43.615602 kubelet[2468]: E1002 20:40:43.615591    2468 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 20:40:43.616596 kubelet[2468]: I1002 20:40:43.616575    2468 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 20:40:43.618712 kubelet[2468]: I1002 20:40:43.618684    2468 server.go:462] "Adding debug handlers to kubelet server"
Oct  2 20:40:43.633557 kubelet[2468]: I1002 20:40:43.633533    2468 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 20:40:43.646904 kubelet[2468]: I1002 20:40:43.646882    2468 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Oct  2 20:40:43.659968 kubelet[2468]: I1002 20:40:43.637893    2468 volume_manager.go:291] "Starting Kubelet Volume Manager"
Oct  2 20:40:43.660080 kubelet[2468]: I1002 20:40:43.637911    2468 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 20:40:43.660355 kubelet[2468]: I1002 20:40:43.660340    2468 reconciler_new.go:29] "Reconciler: start to sync state"
Oct  2 20:40:43.681391 kubelet[2468]: I1002 20:40:43.680151    2468 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Oct  2 20:40:43.685515 kubelet[2468]: I1002 20:40:43.685476    2468 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Oct  2 20:40:43.685627 kubelet[2468]: I1002 20:40:43.685537    2468 status_manager.go:217] "Starting to sync pod status with apiserver"
Oct  2 20:40:43.685627 kubelet[2468]: I1002 20:40:43.685557    2468 kubelet.go:2303] "Starting kubelet main sync loop"
Oct  2 20:40:43.685627 kubelet[2468]: E1002 20:40:43.685604    2468 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 20:40:43.733489 kubelet[2468]: I1002 20:40:43.733455    2468 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 20:40:43.733489 kubelet[2468]: I1002 20:40:43.733478    2468 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 20:40:43.733489 kubelet[2468]: I1002 20:40:43.733495    2468 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 20:40:43.733676 kubelet[2468]: I1002 20:40:43.733640    2468 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Oct  2 20:40:43.733676 kubelet[2468]: I1002 20:40:43.733658    2468 state_mem.go:96] "Updated CPUSet assignments" assignments={}
Oct  2 20:40:43.733676 kubelet[2468]: I1002 20:40:43.733664    2468 policy_none.go:49] "None policy: Start"
Oct  2 20:40:43.734249 kubelet[2468]: I1002 20:40:43.734228    2468 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 20:40:43.734249 kubelet[2468]: I1002 20:40:43.734251    2468 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 20:40:43.734448 kubelet[2468]: I1002 20:40:43.734434    2468 state_mem.go:75] "Updated machine memory state"
Oct  2 20:40:43.737815 kubelet[2468]: I1002 20:40:43.737788    2468 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 20:40:43.736000 audit[2468]: AVC avc:  denied  { mac_admin } for  pid=2468 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:43.736000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 20:40:43.736000 audit[2468]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001243170 a1=4001275e48 a2=4001243140 a3=25 items=0 ppid=1 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:43.736000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 20:40:43.738052 kubelet[2468]: I1002 20:40:43.737883    2468 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 20:40:43.738077 kubelet[2468]: I1002 20:40:43.738059    2468 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 20:40:43.745307 kubelet[2468]: I1002 20:40:43.745273    2468 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.766277 kubelet[2468]: I1002 20:40:43.766234    2468 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.766436 kubelet[2468]: I1002 20:40:43.766318    2468 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.786179 kubelet[2468]: I1002 20:40:43.786141    2468 topology_manager.go:215] "Topology Admit Handler" podUID="70a538b324029fea7b9965b9d7a2e124" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.786287 kubelet[2468]: I1002 20:40:43.786253    2468 topology_manager.go:215] "Topology Admit Handler" podUID="71596ec737060020bef1f068f498885c" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.786313 kubelet[2468]: I1002 20:40:43.786289    2468 topology_manager.go:215] "Topology Admit Handler" podUID="bffc04f2827b4beb463b626d42bec6aa" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.798186 kubelet[2468]: W1002 20:40:43.798151    2468 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:43.800710 kubelet[2468]: W1002 20:40:43.800682    2468 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:43.800710 kubelet[2468]: W1002 20:40:43.800715    2468 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:43.800840 kubelet[2468]: E1002 20:40:43.800757    2468 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.800840 kubelet[2468]: E1002 20:40:43.800816    2468 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-c505880dad\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.961984 kubelet[2468]: I1002 20:40:43.961860    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.961984 kubelet[2468]: I1002 20:40:43.961907    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.961984 kubelet[2468]: I1002 20:40:43.961936    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.961984 kubelet[2468]: I1002 20:40:43.961956    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.961984 kubelet[2468]: I1002 20:40:43.961987    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bffc04f2827b4beb463b626d42bec6aa-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-c505880dad\" (UID: \"bffc04f2827b4beb463b626d42bec6aa\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.962213 kubelet[2468]: I1002 20:40:43.962027    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.962213 kubelet[2468]: I1002 20:40:43.962049    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.962213 kubelet[2468]: I1002 20:40:43.962069    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/71596ec737060020bef1f068f498885c-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-c505880dad\" (UID: \"71596ec737060020bef1f068f498885c\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:43.962213 kubelet[2468]: I1002 20:40:43.962091    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/70a538b324029fea7b9965b9d7a2e124-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-c505880dad\" (UID: \"70a538b324029fea7b9965b9d7a2e124\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:44.601910 kubelet[2468]: I1002 20:40:44.601861    2468 apiserver.go:52] "Watching apiserver"
Oct  2 20:40:44.661295 kubelet[2468]: I1002 20:40:44.661243    2468 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 20:40:44.732623 kubelet[2468]: W1002 20:40:44.732582    2468 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 20:40:44.732828 kubelet[2468]: E1002 20:40:44.732649    2468 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-c505880dad\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad"
Oct  2 20:40:44.789772 kubelet[2468]: I1002 20:40:44.789734    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-c505880dad" podStartSLOduration=1.789656091 podCreationTimestamp="2023-10-02 20:40:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:40:44.769520732 +0000 UTC m=+1.276278825" watchObservedRunningTime="2023-10-02 20:40:44.789656091 +0000 UTC m=+1.296414144"
Oct  2 20:40:44.816038 kubelet[2468]: I1002 20:40:44.816001    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-c505880dad" podStartSLOduration=2.815962926 podCreationTimestamp="2023-10-02 20:40:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:40:44.79077973 +0000 UTC m=+1.297537823" watchObservedRunningTime="2023-10-02 20:40:44.815962926 +0000 UTC m=+1.322721019"
Oct  2 20:40:44.837181 kubelet[2468]: I1002 20:40:44.837135    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-c505880dad" podStartSLOduration=2.837100941 podCreationTimestamp="2023-10-02 20:40:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:40:44.823493688 +0000 UTC m=+1.330251741" watchObservedRunningTime="2023-10-02 20:40:44.837100941 +0000 UTC m=+1.343859034"
Oct  2 20:40:45.077000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.083191 kernel: kauditd_printk_skb: 272 callbacks suppressed
Oct  2 20:40:45.083312 kernel: audit: type=1400 audit(1696279245.077:927): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.077000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9c60 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.137992 kernel: audit: type=1300 audit(1696279245.077:927): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9c60 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.163020 kernel: audit: type=1327 audit(1696279245.077:927): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.077000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.185749 kernel: audit: type=1400 audit(1696279245.077:928): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.077000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9da0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.225120 kernel: audit: type=1300 audit(1696279245.077:928): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9da0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.077000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.249244 kernel: audit: type=1327 audit(1696279245.077:928): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.082000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.273582 kernel: audit: type=1400 audit(1696279245.082:929): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.082000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9ee0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.315703 kernel: audit: type=1300 audit(1696279245.082:929): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ca9ee0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.351859 kernel: audit: type=1327 audit(1696279245.082:929): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:45.082000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.376729 kernel: audit: type=1400 audit(1696279245.082:930): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:40:45.082000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000dd2020 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:45.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:48.821755 sudo[1704]: pam_unix(sudo:session): session closed for user root
Oct  2 20:40:48.820000 audit[1704]: USER_END pid=1704 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:48.821000 audit[1704]: CRED_DISP pid=1704 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:48.895643 sshd[1701]: pam_unix(sshd:session): session closed for user core
Oct  2 20:40:48.895000 audit[1701]: USER_END pid=1701 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:48.895000 audit[1701]: CRED_DISP pid=1701 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:40:48.898742 systemd-logind[1363]: Session 9 logged out. Waiting for processes to exit.
Oct  2 20:40:48.898923 systemd[1]: sshd@6-10.200.20.48:22-10.200.12.6:56186.service: Deactivated successfully.
Oct  2 20:40:48.899674 systemd[1]: session-9.scope: Deactivated successfully.
Oct  2 20:40:48.899849 systemd[1]: session-9.scope: Consumed 6.480s CPU time.
Oct  2 20:40:48.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.48:22-10.200.12.6:56186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:40:48.900512 systemd-logind[1363]: Removed session 9.
Oct  2 20:40:56.903000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 20:40:56.909451 kernel: kauditd_printk_skb: 7 callbacks suppressed
Oct  2 20:40:56.909600 kernel: audit: type=1400 audit(1696279256.903:936): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 20:40:56.903000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d22f40 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:56.932592 kernel: audit: type=1300 audit(1696279256.903:936): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d22f40 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:40:56.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:56.985731 kernel: audit: type=1327 audit(1696279256.903:936): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:40:57.377226 kubelet[2468]: I1002 20:40:57.377202    2468 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Oct  2 20:40:57.378035 env[1379]: time="2023-10-02T20:40:57.378002762Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Oct  2 20:40:57.378526 kubelet[2468]: I1002 20:40:57.378500    2468 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Oct  2 20:40:57.971246 kubelet[2468]: I1002 20:40:57.971179    2468 topology_manager.go:215] "Topology Admit Handler" podUID="b59955ff-361e-4cd4-9f72-7df6ba665164" podNamespace="kube-system" podName="kube-proxy-sbxfh"
Oct  2 20:40:57.975847 systemd[1]: Created slice kubepods-besteffort-podb59955ff_361e_4cd4_9f72_7df6ba665164.slice.
Oct  2 20:40:58.133079 kubelet[2468]: I1002 20:40:58.133024    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b59955ff-361e-4cd4-9f72-7df6ba665164-xtables-lock\") pod \"kube-proxy-sbxfh\" (UID: \"b59955ff-361e-4cd4-9f72-7df6ba665164\") " pod="kube-system/kube-proxy-sbxfh"
Oct  2 20:40:58.133079 kubelet[2468]: I1002 20:40:58.133082    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b59955ff-361e-4cd4-9f72-7df6ba665164-lib-modules\") pod \"kube-proxy-sbxfh\" (UID: \"b59955ff-361e-4cd4-9f72-7df6ba665164\") " pod="kube-system/kube-proxy-sbxfh"
Oct  2 20:40:58.133283 kubelet[2468]: I1002 20:40:58.133118    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b59955ff-361e-4cd4-9f72-7df6ba665164-kube-proxy\") pod \"kube-proxy-sbxfh\" (UID: \"b59955ff-361e-4cd4-9f72-7df6ba665164\") " pod="kube-system/kube-proxy-sbxfh"
Oct  2 20:40:58.133283 kubelet[2468]: I1002 20:40:58.133140    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wb67p\" (UniqueName: \"kubernetes.io/projected/b59955ff-361e-4cd4-9f72-7df6ba665164-kube-api-access-wb67p\") pod \"kube-proxy-sbxfh\" (UID: \"b59955ff-361e-4cd4-9f72-7df6ba665164\") " pod="kube-system/kube-proxy-sbxfh"
Oct  2 20:40:58.282379 env[1379]: time="2023-10-02T20:40:58.281875679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sbxfh,Uid:b59955ff-361e-4cd4-9f72-7df6ba665164,Namespace:kube-system,Attempt:0,}"
Oct  2 20:40:58.350104 env[1379]: time="2023-10-02T20:40:58.345910679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:40:58.350104 env[1379]: time="2023-10-02T20:40:58.345972113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:40:58.350104 env[1379]: time="2023-10-02T20:40:58.345982631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:40:58.350104 env[1379]: time="2023-10-02T20:40:58.346134216Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5dc2a6f5d80fa5f6d7fdfdfb200675f3402038e09395c4f786e3b693e7f20eb0 pid=2552 runtime=io.containerd.runc.v2
Oct  2 20:40:58.370026 systemd[1]: Started cri-containerd-5dc2a6f5d80fa5f6d7fdfdfb200675f3402038e09395c4f786e3b693e7f20eb0.scope.
Oct  2 20:40:58.387241 kubelet[2468]: I1002 20:40:58.386562    2468 topology_manager.go:215] "Topology Admit Handler" podUID="53dd619e-0edd-41e3-a171-4492da1e066a" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-cgnmx"
Oct  2 20:40:58.391609 systemd[1]: Created slice kubepods-besteffort-pod53dd619e_0edd_41e3_a171_4492da1e066a.slice.
Oct  2 20:40:58.394000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.438333 kernel: audit: type=1400 audit(1696279258.394:937): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.438436 kernel: audit: type=1400 audit(1696279258.414:938): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.456389 kernel: audit: type=1400 audit(1696279258.414:939): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.476865 kernel: audit: type=1400 audit(1696279258.414:940): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.479423 env[1379]: time="2023-10-02T20:40:58.479345320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sbxfh,Uid:b59955ff-361e-4cd4-9f72-7df6ba665164,Namespace:kube-system,Attempt:0,} returns sandbox id \"5dc2a6f5d80fa5f6d7fdfdfb200675f3402038e09395c4f786e3b693e7f20eb0\""
Oct  2 20:40:58.496555 kernel: audit: type=1400 audit(1696279258.414:941): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.514523 kernel: audit: type=1400 audit(1696279258.414:942): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.519020 kernel: audit: type=1400 audit(1696279258.414:943): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.519143 env[1379]: time="2023-10-02T20:40:58.517227328Z" level=info msg="CreateContainer within sandbox \"5dc2a6f5d80fa5f6d7fdfdfb200675f3402038e09395c4f786e3b693e7f20eb0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.414000 audit: BPF prog-id=110 op=LOAD
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2552 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633261366635643830666135663664376664666466623230303637
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2552 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633261366635643830666135663664376664666466623230303637
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit: BPF prog-id=111 op=LOAD
Oct  2 20:40:58.415000 audit[2562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2552 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633261366635643830666135663664376664666466623230303637
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.415000 audit: BPF prog-id=112 op=LOAD
Oct  2 20:40:58.415000 audit[2562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2552 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633261366635643830666135663664376664666466623230303637
Oct  2 20:40:58.416000 audit: BPF prog-id=112 op=UNLOAD
Oct  2 20:40:58.416000 audit: BPF prog-id=111 op=UNLOAD
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { perfmon } for  pid=2562 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit[2562]: AVC avc:  denied  { bpf } for  pid=2562 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.416000 audit: BPF prog-id=113 op=LOAD
Oct  2 20:40:58.416000 audit[2562]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2552 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564633261366635643830666135663664376664666466623230303637
Oct  2 20:40:58.538520 kubelet[2468]: I1002 20:40:58.538382    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/53dd619e-0edd-41e3-a171-4492da1e066a-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-cgnmx\" (UID: \"53dd619e-0edd-41e3-a171-4492da1e066a\") " pod="tigera-operator/tigera-operator-8547bd6cc6-cgnmx"
Oct  2 20:40:58.538520 kubelet[2468]: I1002 20:40:58.538424    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fx4m6\" (UniqueName: \"kubernetes.io/projected/53dd619e-0edd-41e3-a171-4492da1e066a-kube-api-access-fx4m6\") pod \"tigera-operator-8547bd6cc6-cgnmx\" (UID: \"53dd619e-0edd-41e3-a171-4492da1e066a\") " pod="tigera-operator/tigera-operator-8547bd6cc6-cgnmx"
Oct  2 20:40:58.596913 env[1379]: time="2023-10-02T20:40:58.596864940Z" level=info msg="CreateContainer within sandbox \"5dc2a6f5d80fa5f6d7fdfdfb200675f3402038e09395c4f786e3b693e7f20eb0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3561c5f67d1e1cc928c99317d1880d8f554af22118c115d8cb3ada66fbeb53d9\""
Oct  2 20:40:58.599251 env[1379]: time="2023-10-02T20:40:58.598608318Z" level=info msg="StartContainer for \"3561c5f67d1e1cc928c99317d1880d8f554af22118c115d8cb3ada66fbeb53d9\""
Oct  2 20:40:58.621107 systemd[1]: Started cri-containerd-3561c5f67d1e1cc928c99317d1880d8f554af22118c115d8cb3ada66fbeb53d9.scope.
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2552 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363163356636376431653163633932386339393331376431383830
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit: BPF prog-id=114 op=LOAD
Oct  2 20:40:58.648000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2552 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363163356636376431653163633932386339393331376431383830
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit: BPF prog-id=115 op=LOAD
Oct  2 20:40:58.648000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2552 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363163356636376431653163633932386339393331376431383830
Oct  2 20:40:58.648000 audit: BPF prog-id=115 op=UNLOAD
Oct  2 20:40:58.648000 audit: BPF prog-id=114 op=UNLOAD
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.648000 audit: BPF prog-id=116 op=LOAD
Oct  2 20:40:58.648000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2552 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363163356636376431653163633932386339393331376431383830
Oct  2 20:40:58.672672 env[1379]: time="2023-10-02T20:40:58.672621438Z" level=info msg="StartContainer for \"3561c5f67d1e1cc928c99317d1880d8f554af22118c115d8cb3ada66fbeb53d9\" returns successfully"
Oct  2 20:40:58.718605 env[1379]: time="2023-10-02T20:40:58.718541927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-cgnmx,Uid:53dd619e-0edd-41e3-a171-4492da1e066a,Namespace:tigera-operator,Attempt:0,}"
Oct  2 20:40:58.744923 kubelet[2468]: I1002 20:40:58.744888    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sbxfh" podStartSLOduration=1.744854622 podCreationTimestamp="2023-10-02 20:40:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:40:58.744169854 +0000 UTC m=+15.250927947" watchObservedRunningTime="2023-10-02 20:40:58.744854622 +0000 UTC m=+15.251612715"
Oct  2 20:40:58.769301 env[1379]: time="2023-10-02T20:40:58.769225600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:40:58.769467 env[1379]: time="2023-10-02T20:40:58.769312751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:40:58.769467 env[1379]: time="2023-10-02T20:40:58.769340308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:40:58.770346 env[1379]: time="2023-10-02T20:40:58.769689312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891 pid=2649 runtime=io.containerd.runc.v2
Oct  2 20:40:58.781000 audit[2670]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.781000 audit[2670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf5e4590 a2=0 a3=ffffbc96f6c0 items=0 ppid=2603 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 20:40:58.783000 audit[2669]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.783000 audit[2669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff9ad7440 a2=0 a3=ffffaeef66c0 items=0 ppid=2603 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 20:40:58.783000 audit[2674]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.783000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2359de0 a2=0 a3=ffffac1b76c0 items=0 ppid=2603 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 20:40:58.787000 audit[2676]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.787000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3910ca0 a2=0 a3=ffffa2ae46c0 items=0 ppid=2603 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 20:40:58.790758 systemd[1]: Started cri-containerd-ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891.scope.
Oct  2 20:40:58.795000 audit[2677]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.795000 audit[2677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe998c690 a2=0 a3=ffff8597d6c0 items=0 ppid=2603 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 20:40:58.798000 audit[2678]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.798000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8933a10 a2=0 a3=ffff82d456c0 items=0 ppid=2603 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.798000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.813000 audit: BPF prog-id=117 op=LOAD
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2649 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313862373362353565646131663035326364333265353030363536
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2649 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313862373362353565646131663035326364333265353030363536
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.814000 audit: BPF prog-id=118 op=LOAD
Oct  2 20:40:58.814000 audit[2662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2649 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313862373362353565646131663035326364333265353030363536
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.815000 audit: BPF prog-id=119 op=LOAD
Oct  2 20:40:58.815000 audit[2662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2649 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313862373362353565646131663035326364333265353030363536
Oct  2 20:40:58.815000 audit: BPF prog-id=119 op=UNLOAD
Oct  2 20:40:58.816000 audit: BPF prog-id=118 op=UNLOAD
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { perfmon } for  pid=2662 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit[2662]: AVC avc:  denied  { bpf } for  pid=2662 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:40:58.816000 audit: BPF prog-id=120 op=LOAD
Oct  2 20:40:58.816000 audit[2662]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2649 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313862373362353565646131663035326364333265353030363536
Oct  2 20:40:58.839955 env[1379]: time="2023-10-02T20:40:58.839917306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-cgnmx,Uid:53dd619e-0edd-41e3-a171-4492da1e066a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891\""
Oct  2 20:40:58.843570 env[1379]: time="2023-10-02T20:40:58.842168551Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\""
Oct  2 20:40:58.878000 audit[2692]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.878000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffffa06810 a2=0 a3=ffffad6f46c0 items=0 ppid=2603 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 20:40:58.882000 audit[2694]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.882000 audit[2694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff6d0ff90 a2=0 a3=ffffaa3996c0 items=0 ppid=2603 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Oct  2 20:40:58.888000 audit[2697]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.888000 audit[2697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd0cada80 a2=0 a3=ffff9a3776c0 items=0 ppid=2603 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Oct  2 20:40:58.890000 audit[2698]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.890000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5fa38e0 a2=0 a3=ffff8de496c0 items=0 ppid=2603 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 20:40:58.893000 audit[2700]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.893000 audit[2700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff34b7cb0 a2=0 a3=ffffa93956c0 items=0 ppid=2603 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 20:40:58.895000 audit[2701]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.895000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe303f0b0 a2=0 a3=ffffa67dc6c0 items=0 ppid=2603 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 20:40:58.899000 audit[2703]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.899000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd81e1db0 a2=0 a3=ffff9d62e6c0 items=0 ppid=2603 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 20:40:58.904000 audit[2706]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.904000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff60504b0 a2=0 a3=ffff891ee6c0 items=0 ppid=2603 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Oct  2 20:40:58.906000 audit[2707]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.906000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc649190 a2=0 a3=ffffbc6ff6c0 items=0 ppid=2603 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 20:40:58.909000 audit[2709]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.909000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff6ab7da0 a2=0 a3=ffffb6efe6c0 items=0 ppid=2603 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 20:40:58.911000 audit[2710]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.911000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd943410 a2=0 a3=ffffaf7f86c0 items=0 ppid=2603 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 20:40:58.915000 audit[2712]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.915000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffaf9a70 a2=0 a3=ffffaa0076c0 items=0 ppid=2603 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 20:40:58.920000 audit[2715]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.920000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd334e8b0 a2=0 a3=ffff8cd3e6c0 items=0 ppid=2603 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 20:40:58.925000 audit[2718]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.925000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffdd4eb0 a2=0 a3=ffff9318d6c0 items=0 ppid=2603 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 20:40:58.927000 audit[2719]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.927000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffff65a8e0 a2=0 a3=ffffa0bb96c0 items=0 ppid=2603 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 20:40:58.931000 audit[2721]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.931000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffee9b9840 a2=0 a3=ffff908806c0 items=0 ppid=2603 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 20:40:58.936000 audit[2724]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.936000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff8936410 a2=0 a3=ffff936706c0 items=0 ppid=2603 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 20:40:58.938000 audit[2725]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.938000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe65bb850 a2=0 a3=ffffb4f896c0 items=0 ppid=2603 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 20:40:58.942000 audit[2727]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_rule pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 20:40:58.942000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd50dece0 a2=0 a3=ffffa042a6c0 items=0 ppid=2603 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 20:40:58.971000 audit[2733]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:40:58.971000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd6414740 a2=0 a3=ffffa0d006c0 items=0 ppid=2603 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:40:58.980000 audit[2733]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:40:58.980000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd6414740 a2=0 a3=ffffa0d006c0 items=0 ppid=2603 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:40:58.983000 audit[2738]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.983000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc78940b0 a2=0 a3=ffffa34746c0 items=0 ppid=2603 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 20:40:58.986000 audit[2740]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.986000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0d6f070 a2=0 a3=ffffa87226c0 items=0 ppid=2603 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Oct  2 20:40:58.992000 audit[2743]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.992000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe087f420 a2=0 a3=ffff95d776c0 items=0 ppid=2603 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Oct  2 20:40:58.994000 audit[2744]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.994000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6920ad0 a2=0 a3=ffff8b2376c0 items=0 ppid=2603 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 20:40:58.997000 audit[2746]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.997000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeef3f030 a2=0 a3=ffff972466c0 items=0 ppid=2603 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 20:40:58.999000 audit[2747]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:58.999000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5c59fa0 a2=0 a3=ffffa8fc16c0 items=0 ppid=2603 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:58.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 20:40:59.002000 audit[2749]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.002000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc665abf0 a2=0 a3=ffffa841f6c0 items=0 ppid=2603 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Oct  2 20:40:59.008000 audit[2752]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.008000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc7b0f790 a2=0 a3=ffffa05766c0 items=0 ppid=2603 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 20:40:59.009000 audit[2753]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.009000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd1624a80 a2=0 a3=ffffb68df6c0 items=0 ppid=2603 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 20:40:59.013000 audit[2755]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.013000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3ad1940 a2=0 a3=ffff93d556c0 items=0 ppid=2603 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 20:40:59.014000 audit[2756]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.014000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd22b1c10 a2=0 a3=ffffaa2686c0 items=0 ppid=2603 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 20:40:59.018000 audit[2758]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.018000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd45dca80 a2=0 a3=ffff8823e6c0 items=0 ppid=2603 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 20:40:59.023000 audit[2761]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.023000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff9b64320 a2=0 a3=ffffadb476c0 items=0 ppid=2603 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 20:40:59.029000 audit[2764]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.029000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4096640 a2=0 a3=ffff9a11b6c0 items=0 ppid=2603 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Oct  2 20:40:59.030000 audit[2765]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.030000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa271c90 a2=0 a3=ffffaa1186c0 items=0 ppid=2603 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 20:40:59.034000 audit[2767]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.034000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe81a8e70 a2=0 a3=ffff92af16c0 items=0 ppid=2603 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 20:40:59.039000 audit[2770]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.039000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff10f9dd0 a2=0 a3=ffffb19896c0 items=0 ppid=2603 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 20:40:59.041000 audit[2771]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.041000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbffa140 a2=0 a3=ffff85ca36c0 items=0 ppid=2603 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 20:40:59.044000 audit[2773]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.044000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcf57d1b0 a2=0 a3=ffff9444b6c0 items=0 ppid=2603 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 20:40:59.046000 audit[2774]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.046000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1ca3ef0 a2=0 a3=ffffbd0536c0 items=0 ppid=2603 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 20:40:59.050000 audit[2776]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.050000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff34e3630 a2=0 a3=ffff9c9cd6c0 items=0 ppid=2603 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 20:40:59.064000 audit[2779]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 20:40:59.064000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe5988730 a2=0 a3=ffff9776a6c0 items=0 ppid=2603 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 20:40:59.068000 audit[2781]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 20:40:59.068000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffca85a220 a2=0 a3=ffffbb1c76c0 items=0 ppid=2603 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.068000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:40:59.068000 audit[2781]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 20:40:59.068000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffca85a220 a2=0 a3=ffffbb1c76c0 items=0 ppid=2603 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:40:59.068000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:40:59.250293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1349716880.mount: Deactivated successfully.
Oct  2 20:41:00.345504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1430422109.mount: Deactivated successfully.
Oct  2 20:41:01.111629 env[1379]: time="2023-10-02T20:41:01.111581937Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:01.122438 env[1379]: time="2023-10-02T20:41:01.122405236Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:01.130318 env[1379]: time="2023-10-02T20:41:01.130277905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:01.136393 env[1379]: time="2023-10-02T20:41:01.136331111Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:01.137142 env[1379]: time="2023-10-02T20:41:01.137109635Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\""
Oct  2 20:41:01.141586 env[1379]: time="2023-10-02T20:41:01.141546480Z" level=info msg="CreateContainer within sandbox \"ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Oct  2 20:41:01.177970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1782713869.mount: Deactivated successfully.
Oct  2 20:41:01.198505 env[1379]: time="2023-10-02T20:41:01.198459222Z" level=info msg="CreateContainer within sandbox \"ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a\""
Oct  2 20:41:01.199435 env[1379]: time="2023-10-02T20:41:01.199406089Z" level=info msg="StartContainer for \"cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a\""
Oct  2 20:41:01.221527 systemd[1]: Started cri-containerd-cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a.scope.
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.239000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.240000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.240000 audit: BPF prog-id=121 op=LOAD
Oct  2 20:41:01.240000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.240000 audit[2790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=2649 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:01.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396535333135343231333933626336306362373665303162316630
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=2649 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:01.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396535333135343231333933626336306362373665303162316630
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit: BPF prog-id=122 op=LOAD
Oct  2 20:41:01.241000 audit[2790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=2649 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:01.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396535333135343231333933626336306362373665303162316630
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.241000 audit: BPF prog-id=123 op=LOAD
Oct  2 20:41:01.241000 audit[2790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=2649 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:01.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396535333135343231333933626336306362373665303162316630
Oct  2 20:41:01.242000 audit: BPF prog-id=123 op=UNLOAD
Oct  2 20:41:01.242000 audit: BPF prog-id=122 op=UNLOAD
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { perfmon } for  pid=2790 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit[2790]: AVC avc:  denied  { bpf } for  pid=2790 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:01.242000 audit: BPF prog-id=124 op=LOAD
Oct  2 20:41:01.242000 audit[2790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=2649 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:01.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363396535333135343231333933626336306362373665303162316630
Oct  2 20:41:01.268667 env[1379]: time="2023-10-02T20:41:01.268609745Z" level=info msg="StartContainer for \"cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a\" returns successfully"
Oct  2 20:41:01.303278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2474323165.mount: Deactivated successfully.
Oct  2 20:41:01.749829 kubelet[2468]: I1002 20:41:01.749791    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-cgnmx" podStartSLOduration=1.453075755 podCreationTimestamp="2023-10-02 20:40:58 +0000 UTC" firstStartedPulling="2023-10-02 20:40:58.84131524 +0000 UTC m=+15.348073333" lastFinishedPulling="2023-10-02 20:41:01.137984589 +0000 UTC m=+17.644742682" observedRunningTime="2023-10-02 20:41:01.749572641 +0000 UTC m=+18.256330734" watchObservedRunningTime="2023-10-02 20:41:01.749745104 +0000 UTC m=+18.256503197"
Oct  2 20:41:03.875000 audit[2824]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.880929 kernel: kauditd_printk_skb: 360 callbacks suppressed
Oct  2 20:41:03.881050 kernel: audit: type=1325 audit(1696279263.875:1048): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.875000 audit[2824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd17b4340 a2=0 a3=ffff9ad316c0 items=0 ppid=2603 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.922741 kernel: audit: type=1300 audit(1696279263.875:1048): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd17b4340 a2=0 a3=ffff9ad316c0 items=0 ppid=2603 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:03.936310 kernel: audit: type=1327 audit(1696279263.875:1048): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:03.895000 audit[2824]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.895000 audit[2824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd17b4340 a2=0 a3=ffff9ad316c0 items=0 ppid=2603 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.982430 kernel: audit: type=1325 audit(1696279263.895:1049): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.982547 kernel: audit: type=1300 audit(1696279263.895:1049): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd17b4340 a2=0 a3=ffff9ad316c0 items=0 ppid=2603 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:03.996080 kernel: audit: type=1327 audit(1696279263.895:1049): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:03.959000 audit[2826]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.959000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd51e7ae0 a2=0 a3=ffffb89376c0 items=0 ppid=2603 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.039062 kernel: audit: type=1325 audit(1696279263.959:1050): table=filter:97 family=2 entries=16 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:04.039178 kernel: audit: type=1300 audit(1696279263.959:1050): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd51e7ae0 a2=0 a3=ffffb89376c0 items=0 ppid=2603 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:03.998000 audit[2826]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:04.068730 kernel: audit: type=1327 audit(1696279263.959:1050): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:04.068875 kernel: audit: type=1325 audit(1696279263.998:1051): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:03.998000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd51e7ae0 a2=0 a3=ffffb89376c0 items=0 ppid=2603 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:03.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:04.112045 kubelet[2468]: I1002 20:41:04.112001    2468 topology_manager.go:215] "Topology Admit Handler" podUID="928583e0-89bf-4600-88e7-22e014aacb26" podNamespace="calico-system" podName="calico-typha-699cddb56c-m8dzz"
Oct  2 20:41:04.116698 systemd[1]: Created slice kubepods-besteffort-pod928583e0_89bf_4600_88e7_22e014aacb26.slice.
Oct  2 20:41:04.172689 kubelet[2468]: I1002 20:41:04.172582    2468 topology_manager.go:215] "Topology Admit Handler" podUID="6f49961d-2849-4548-b836-31eea299d5af" podNamespace="calico-system" podName="calico-node-4s5pq"
Oct  2 20:41:04.177881 systemd[1]: Created slice kubepods-besteffort-pod6f49961d_2849_4548_b836_31eea299d5af.slice.
Oct  2 20:41:04.283923 kubelet[2468]: I1002 20:41:04.283889    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-lib-modules\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284187 kubelet[2468]: I1002 20:41:04.284133    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/928583e0-89bf-4600-88e7-22e014aacb26-typha-certs\") pod \"calico-typha-699cddb56c-m8dzz\" (UID: \"928583e0-89bf-4600-88e7-22e014aacb26\") " pod="calico-system/calico-typha-699cddb56c-m8dzz"
Oct  2 20:41:04.284307 kubelet[2468]: I1002 20:41:04.284296    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-cni-bin-dir\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284415 kubelet[2468]: I1002 20:41:04.284405    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-flexvol-driver-host\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284524 kubelet[2468]: I1002 20:41:04.284514    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6f49961d-2849-4548-b836-31eea299d5af-node-certs\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284624 kubelet[2468]: I1002 20:41:04.284613    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-cni-net-dir\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284724 kubelet[2468]: I1002 20:41:04.284714    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/928583e0-89bf-4600-88e7-22e014aacb26-tigera-ca-bundle\") pod \"calico-typha-699cddb56c-m8dzz\" (UID: \"928583e0-89bf-4600-88e7-22e014aacb26\") " pod="calico-system/calico-typha-699cddb56c-m8dzz"
Oct  2 20:41:04.284831 kubelet[2468]: I1002 20:41:04.284821    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-var-run-calico\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.284937 kubelet[2468]: I1002 20:41:04.284927    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-xtables-lock\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.285039 kubelet[2468]: I1002 20:41:04.285028    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6f49961d-2849-4548-b836-31eea299d5af-tigera-ca-bundle\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.285142 kubelet[2468]: I1002 20:41:04.285132    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jbgwh\" (UniqueName: \"kubernetes.io/projected/928583e0-89bf-4600-88e7-22e014aacb26-kube-api-access-jbgwh\") pod \"calico-typha-699cddb56c-m8dzz\" (UID: \"928583e0-89bf-4600-88e7-22e014aacb26\") " pod="calico-system/calico-typha-699cddb56c-m8dzz"
Oct  2 20:41:04.285233 kubelet[2468]: I1002 20:41:04.285223    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-policysync\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.285334 kubelet[2468]: I1002 20:41:04.285324    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-var-lib-calico\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.285444 kubelet[2468]: I1002 20:41:04.285434    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6f49961d-2849-4548-b836-31eea299d5af-cni-log-dir\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.285551 kubelet[2468]: I1002 20:41:04.285541    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nbvx8\" (UniqueName: \"kubernetes.io/projected/6f49961d-2849-4548-b836-31eea299d5af-kube-api-access-nbvx8\") pod \"calico-node-4s5pq\" (UID: \"6f49961d-2849-4548-b836-31eea299d5af\") " pod="calico-system/calico-node-4s5pq"
Oct  2 20:41:04.400492 kubelet[2468]: E1002 20:41:04.400455    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.400492 kubelet[2468]: W1002 20:41:04.400482    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.400666 kubelet[2468]: E1002 20:41:04.400520    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.407260 kubelet[2468]: E1002 20:41:04.407230    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.407260 kubelet[2468]: W1002 20:41:04.407251    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.407420 kubelet[2468]: E1002 20:41:04.407273    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.407499 kubelet[2468]: E1002 20:41:04.407479    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.407499 kubelet[2468]: W1002 20:41:04.407493    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.407577 kubelet[2468]: E1002 20:41:04.407508    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.408523 kubelet[2468]: E1002 20:41:04.408486    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.408523 kubelet[2468]: W1002 20:41:04.408512    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.408632 kubelet[2468]: E1002 20:41:04.408565    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.414510 kubelet[2468]: E1002 20:41:04.414489    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.414625 kubelet[2468]: W1002 20:41:04.414612    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.414777 kubelet[2468]: E1002 20:41:04.414765    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.415188 kubelet[2468]: E1002 20:41:04.415167    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.415188 kubelet[2468]: W1002 20:41:04.415183    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.415353 kubelet[2468]: E1002 20:41:04.415339    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.415353 kubelet[2468]: W1002 20:41:04.415350    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.415454 kubelet[2468]: E1002 20:41:04.415434    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.415481 kubelet[2468]: E1002 20:41:04.415458    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.415579 kubelet[2468]: E1002 20:41:04.415565    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.415579 kubelet[2468]: W1002 20:41:04.415576    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.415579 kubelet[2468]: E1002 20:41:04.415587    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.415723    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.418095 kubelet[2468]: W1002 20:41:04.415736    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.415746    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.415852    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.418095 kubelet[2468]: W1002 20:41:04.415859    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.415867    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.416008    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.418095 kubelet[2468]: W1002 20:41:04.416014    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.418095 kubelet[2468]: E1002 20:41:04.416023    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.425936 kubelet[2468]: E1002 20:41:04.425867    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.426029 kubelet[2468]: W1002 20:41:04.426015    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.426105 kubelet[2468]: E1002 20:41:04.426094    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.427841 kubelet[2468]: E1002 20:41:04.427825    2468 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 20:41:04.427961 kubelet[2468]: W1002 20:41:04.427947    2468 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 20:41:04.428037 kubelet[2468]: E1002 20:41:04.428027    2468 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 20:41:04.480717 env[1379]: time="2023-10-02T20:41:04.480665252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4s5pq,Uid:6f49961d-2849-4548-b836-31eea299d5af,Namespace:calico-system,Attempt:0,}"
Oct  2 20:41:04.534591 env[1379]: time="2023-10-02T20:41:04.534480566Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:04.534591 env[1379]: time="2023-10-02T20:41:04.534523522Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:04.534591 env[1379]: time="2023-10-02T20:41:04.534533881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:04.535071 env[1379]: time="2023-10-02T20:41:04.534998078Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00 pid=2852 runtime=io.containerd.runc.v2
Oct  2 20:41:04.551992 systemd[1]: Started cri-containerd-f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00.scope.
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.578000 audit: BPF prog-id=125 op=LOAD
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2852 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633636353838353833313061626639653836346563616364303066
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2852 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633636353838353833313061626639653836346563616364303066
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit: BPF prog-id=126 op=LOAD
Oct  2 20:41:04.579000 audit[2862]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2852 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633636353838353833313061626639653836346563616364303066
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit: BPF prog-id=127 op=LOAD
Oct  2 20:41:04.579000 audit[2862]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2852 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633636353838353833313061626639653836346563616364303066
Oct  2 20:41:04.579000 audit: BPF prog-id=127 op=UNLOAD
Oct  2 20:41:04.579000 audit: BPF prog-id=126 op=UNLOAD
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { perfmon } for  pid=2862 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit[2862]: AVC avc:  denied  { bpf } for  pid=2862 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.579000 audit: BPF prog-id=128 op=LOAD
Oct  2 20:41:04.579000 audit[2862]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2852 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632633636353838353833313061626639653836346563616364303066
Oct  2 20:41:04.606883 env[1379]: time="2023-10-02T20:41:04.606835007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4s5pq,Uid:6f49961d-2849-4548-b836-31eea299d5af,Namespace:calico-system,Attempt:0,} returns sandbox id \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\""
Oct  2 20:41:04.608616 env[1379]: time="2023-10-02T20:41:04.608587686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\""
Oct  2 20:41:04.720527 env[1379]: time="2023-10-02T20:41:04.720410005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-699cddb56c-m8dzz,Uid:928583e0-89bf-4600-88e7-22e014aacb26,Namespace:calico-system,Attempt:0,}"
Oct  2 20:41:04.779393 env[1379]: time="2023-10-02T20:41:04.779308129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:04.779565 env[1379]: time="2023-10-02T20:41:04.779540547Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:04.779688 env[1379]: time="2023-10-02T20:41:04.779665736Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:04.779952 env[1379]: time="2023-10-02T20:41:04.779921712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cdd43be22933ede6127435851a0326e22ecd231a8f7b9a3afbf4bbc49645b26e pid=2893 runtime=io.containerd.runc.v2
Oct  2 20:41:04.803901 systemd[1]: Started cri-containerd-cdd43be22933ede6127435851a0326e22ecd231a8f7b9a3afbf4bbc49645b26e.scope.
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.828000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit: BPF prog-id=129 op=LOAD
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643433626532323933336564653631323734333538353161303332
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643433626532323933336564653631323734333538353161303332
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit: BPF prog-id=130 op=LOAD
Oct  2 20:41:04.829000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643433626532323933336564653631323734333538353161303332
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit: BPF prog-id=131 op=LOAD
Oct  2 20:41:04.829000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643433626532323933336564653631323734333538353161303332
Oct  2 20:41:04.829000 audit: BPF prog-id=131 op=UNLOAD
Oct  2 20:41:04.829000 audit: BPF prog-id=130 op=UNLOAD
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { perfmon } for  pid=2903 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit[2903]: AVC avc:  denied  { bpf } for  pid=2903 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:04.829000 audit: BPF prog-id=132 op=LOAD
Oct  2 20:41:04.829000 audit[2903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2893 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364643433626532323933336564653631323734333538353161303332
Oct  2 20:41:04.857989 env[1379]: time="2023-10-02T20:41:04.857947431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-699cddb56c-m8dzz,Uid:928583e0-89bf-4600-88e7-22e014aacb26,Namespace:calico-system,Attempt:0,} returns sandbox id \"cdd43be22933ede6127435851a0326e22ecd231a8f7b9a3afbf4bbc49645b26e\""
Oct  2 20:41:05.046000 audit[2927]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:05.046000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffe349d760 a2=0 a3=ffff980266c0 items=0 ppid=2603 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:05.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:05.047000 audit[2927]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:05.047000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe349d760 a2=0 a3=ffff980266c0 items=0 ppid=2603 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:05.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:05.882043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount959141298.mount: Deactivated successfully.
Oct  2 20:41:06.075657 env[1379]: time="2023-10-02T20:41:06.075605337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:06.082845 env[1379]: time="2023-10-02T20:41:06.082813177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:06.087466 env[1379]: time="2023-10-02T20:41:06.087426488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:06.092198 env[1379]: time="2023-10-02T20:41:06.092171747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:06.092710 env[1379]: time="2023-10-02T20:41:06.092681381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\""
Oct  2 20:41:06.095638 env[1379]: time="2023-10-02T20:41:06.095597603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\""
Oct  2 20:41:06.101036 env[1379]: time="2023-10-02T20:41:06.101001723Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Oct  2 20:41:06.139627 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2133444312.mount: Deactivated successfully.
Oct  2 20:41:06.168173 env[1379]: time="2023-10-02T20:41:06.168127924Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed\""
Oct  2 20:41:06.169107 env[1379]: time="2023-10-02T20:41:06.169081079Z" level=info msg="StartContainer for \"f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed\""
Oct  2 20:41:06.191531 systemd[1]: Started cri-containerd-f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed.scope.
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2852 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:06.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303231323431313761323530666266363266323830363662316138
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit: BPF prog-id=133 op=LOAD
Oct  2 20:41:06.211000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2852 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:06.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303231323431313761323530666266363266323830363662316138
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit: BPF prog-id=134 op=LOAD
Oct  2 20:41:06.211000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2852 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:06.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303231323431313761323530666266363266323830363662316138
Oct  2 20:41:06.211000 audit: BPF prog-id=134 op=UNLOAD
Oct  2 20:41:06.211000 audit: BPF prog-id=133 op=UNLOAD
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { perfmon } for  pid=2937 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit[2937]: AVC avc:  denied  { bpf } for  pid=2937 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:06.211000 audit: BPF prog-id=135 op=LOAD
Oct  2 20:41:06.211000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2852 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:06.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303231323431313761323530666266363266323830363662316138
Oct  2 20:41:06.240385 systemd[1]: cri-containerd-f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed.scope: Deactivated successfully.
Oct  2 20:41:06.241115 env[1379]: time="2023-10-02T20:41:06.240616729Z" level=info msg="StartContainer for \"f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed\" returns successfully"
Oct  2 20:41:06.243000 audit: BPF prog-id=135 op=UNLOAD
Oct  2 20:41:06.725459 env[1379]: time="2023-10-02T20:41:06.725406573Z" level=info msg="shim disconnected" id=f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed
Oct  2 20:41:06.725459 env[1379]: time="2023-10-02T20:41:06.725453449Z" level=warning msg="cleaning up after shim disconnected" id=f602124117a250fbf62f28066b1a8a38cd3ef4c9c236823db0b3997c6d6ac8ed namespace=k8s.io
Oct  2 20:41:06.725459 env[1379]: time="2023-10-02T20:41:06.725463368Z" level=info msg="cleaning up dead shim"
Oct  2 20:41:06.740646 env[1379]: time="2023-10-02T20:41:06.740603384Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:41:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2975 runtime=io.containerd.runc.v2\n"
Oct  2 20:41:07.633521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1185157665.mount: Deactivated successfully.
Oct  2 20:41:08.352156 env[1379]: time="2023-10-02T20:41:08.352109728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:08.361725 env[1379]: time="2023-10-02T20:41:08.361687309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:08.366213 env[1379]: time="2023-10-02T20:41:08.366184605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:08.370721 env[1379]: time="2023-10-02T20:41:08.370694259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:08.371225 env[1379]: time="2023-10-02T20:41:08.371198496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\""
Oct  2 20:41:08.373581 env[1379]: time="2023-10-02T20:41:08.372552820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\""
Oct  2 20:41:08.374542 env[1379]: time="2023-10-02T20:41:08.374135925Z" level=info msg="CreateContainer within sandbox \"cdd43be22933ede6127435851a0326e22ecd231a8f7b9a3afbf4bbc49645b26e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Oct  2 20:41:08.409866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1708201726.mount: Deactivated successfully.
Oct  2 20:41:08.427526 env[1379]: time="2023-10-02T20:41:08.427448289Z" level=info msg="CreateContainer within sandbox \"cdd43be22933ede6127435851a0326e22ecd231a8f7b9a3afbf4bbc49645b26e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"aae987925b0f24c873bdc3574c13037381af8cb6b9ed2c813c5779407078b351\""
Oct  2 20:41:08.428275 env[1379]: time="2023-10-02T20:41:08.428245261Z" level=info msg="StartContainer for \"aae987925b0f24c873bdc3574c13037381af8cb6b9ed2c813c5779407078b351\""
Oct  2 20:41:08.449773 systemd[1]: Started cri-containerd-aae987925b0f24c873bdc3574c13037381af8cb6b9ed2c813c5779407078b351.scope.
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.467000 audit: BPF prog-id=136 op=LOAD
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2893 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653938373932356230663234633837336264633335373463313330
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2893 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653938373932356230663234633837336264633335373463313330
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.468000 audit: BPF prog-id=137 op=LOAD
Oct  2 20:41:08.468000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2893 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653938373932356230663234633837336264633335373463313330
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit: BPF prog-id=138 op=LOAD
Oct  2 20:41:08.469000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2893 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653938373932356230663234633837336264633335373463313330
Oct  2 20:41:08.469000 audit: BPF prog-id=138 op=UNLOAD
Oct  2 20:41:08.469000 audit: BPF prog-id=137 op=UNLOAD
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { perfmon } for  pid=3001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit[3001]: AVC avc:  denied  { bpf } for  pid=3001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:08.469000 audit: BPF prog-id=139 op=LOAD
Oct  2 20:41:08.469000 audit[3001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2893 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653938373932356230663234633837336264633335373463313330
Oct  2 20:41:08.495950 env[1379]: time="2023-10-02T20:41:08.495906518Z" level=info msg="StartContainer for \"aae987925b0f24c873bdc3574c13037381af8cb6b9ed2c813c5779407078b351\" returns successfully"
Oct  2 20:41:08.777649 kubelet[2468]: I1002 20:41:08.777614    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-699cddb56c-m8dzz" podStartSLOduration=1.265378439 podCreationTimestamp="2023-10-02 20:41:04 +0000 UTC" firstStartedPulling="2023-10-02 20:41:04.85946749 +0000 UTC m=+21.366225583" lastFinishedPulling="2023-10-02 20:41:08.371669576 +0000 UTC m=+24.878427669" observedRunningTime="2023-10-02 20:41:08.768669007 +0000 UTC m=+25.275427100" watchObservedRunningTime="2023-10-02 20:41:08.777580525 +0000 UTC m=+25.284338618"
Oct  2 20:41:08.793000 audit[3032]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:08.793000 audit[3032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffff44f8740 a2=0 a3=ffffbb63a6c0 items=0 ppid=2603 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:08.794000 audit[3032]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:08.794000 audit[3032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=fffff44f8740 a2=0 a3=ffffbb63a6c0 items=0 ppid=2603 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:08.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:09.466924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1818342079.mount: Deactivated successfully.
Oct  2 20:41:11.581924 env[1379]: time="2023-10-02T20:41:11.581852800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:11.593754 env[1379]: time="2023-10-02T20:41:11.593702882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:11.601404 env[1379]: time="2023-10-02T20:41:11.601348143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:11.604679 env[1379]: time="2023-10-02T20:41:11.604632558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:11.605283 env[1379]: time="2023-10-02T20:41:11.605251547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\""
Oct  2 20:41:11.609704 env[1379]: time="2023-10-02T20:41:11.609673710Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Oct  2 20:41:11.640596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3665042254.mount: Deactivated successfully.
Oct  2 20:41:11.644854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1836241742.mount: Deactivated successfully.
Oct  2 20:41:11.667937 env[1379]: time="2023-10-02T20:41:11.667892001Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2\""
Oct  2 20:41:11.670210 env[1379]: time="2023-10-02T20:41:11.668874202Z" level=info msg="StartContainer for \"cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2\""
Oct  2 20:41:11.700045 systemd[1]: Started cri-containerd-cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2.scope.
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.724714 kernel: kauditd_printk_skb: 229 callbacks suppressed
Oct  2 20:41:11.724822 kernel: audit: type=1400 audit(1696279271.717:1117): avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2852 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:11.767918 kernel: audit: type=1300 audit(1696279271.717:1117): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2852 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:11.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363630643563376635633435393139346262663535333338616139
Oct  2 20:41:11.794985 kernel: audit: type=1327 audit(1696279271.717:1117): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363630643563376635633435393139346262663535333338616139
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.815103 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.836979 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.856794 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.856928 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.893497 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.893615 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.911762 env[1379]: time="2023-10-02T20:41:11.911721600Z" level=info msg="StartContainer for \"cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2\" returns successfully"
Oct  2 20:41:11.929252 kernel: audit: type=1400 audit(1696279271.717:1118): avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.717000 audit: BPF prog-id=140 op=LOAD
Oct  2 20:41:11.717000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2852 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:11.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363630643563376635633435393139346262663535333338616139
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit: BPF prog-id=141 op=LOAD
Oct  2 20:41:11.718000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2852 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:11.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363630643563376635633435393139346262663535333338616139
Oct  2 20:41:11.718000 audit: BPF prog-id=141 op=UNLOAD
Oct  2 20:41:11.718000 audit: BPF prog-id=140 op=UNLOAD
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { perfmon } for  pid=3041 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit[3041]: AVC avc:  denied  { bpf } for  pid=3041 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:11.718000 audit: BPF prog-id=142 op=LOAD
Oct  2 20:41:11.718000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2852 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:11.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363630643563376635633435393139346262663535333338616139
Oct  2 20:41:13.124193 env[1379]: time="2023-10-02T20:41:13.124124280Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 20:41:13.126877 systemd[1]: cri-containerd-cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2.scope: Deactivated successfully.
Oct  2 20:41:13.129000 audit: BPF prog-id=142 op=UNLOAD
Oct  2 20:41:13.132310 kubelet[2468]: I1002 20:41:13.132287    2468 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Oct  2 20:41:13.167029 kubelet[2468]: I1002 20:41:13.166992    2468 topology_manager.go:215] "Topology Admit Handler" podUID="94088da4-a637-4a4f-8d7a-846ff32d11fa" podNamespace="kube-system" podName="coredns-5dd5756b68-ln7nz"
Oct  2 20:41:13.170988 kubelet[2468]: I1002 20:41:13.170961    2468 topology_manager.go:215] "Topology Admit Handler" podUID="ec53cbea-214c-4e27-8cd8-8227d8c2f7ec" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-f7qmn"
Oct  2 20:41:13.171599 kubelet[2468]: I1002 20:41:13.171581    2468 topology_manager.go:215] "Topology Admit Handler" podUID="6981657c-eddf-4bb1-9959-fd0361528968" podNamespace="kube-system" podName="coredns-5dd5756b68-fc2vc"
Oct  2 20:41:13.173373 systemd[1]: Created slice kubepods-burstable-pod94088da4_a637_4a4f_8d7a_846ff32d11fa.slice.
Oct  2 20:41:13.184343 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2-rootfs.mount: Deactivated successfully.
Oct  2 20:41:13.190520 systemd[1]: Created slice kubepods-besteffort-podec53cbea_214c_4e27_8cd8_8227d8c2f7ec.slice.
Oct  2 20:41:13.200322 systemd[1]: Created slice kubepods-burstable-pod6981657c_eddf_4bb1_9959_fd0361528968.slice.
Oct  2 20:41:13.214200 kubelet[2468]: I1002 20:41:13.214162    2468 topology_manager.go:215] "Topology Admit Handler" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486" podNamespace="calico-system" podName="csi-node-driver-nkzvw"
Oct  2 20:41:13.818139 kubelet[2468]: I1002 20:41:13.346528    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9zc8x\" (UniqueName: \"kubernetes.io/projected/df7d8fb0-7726-4a14-858c-04cbad2f6486-kube-api-access-9zc8x\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818139 kubelet[2468]: I1002 20:41:13.346633    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6h6jh\" (UniqueName: \"kubernetes.io/projected/ec53cbea-214c-4e27-8cd8-8227d8c2f7ec-kube-api-access-6h6jh\") pod \"calico-kube-controllers-74b9887bb6-f7qmn\" (UID: \"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec\") " pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn"
Oct  2 20:41:13.818139 kubelet[2468]: I1002 20:41:13.346655    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/df7d8fb0-7726-4a14-858c-04cbad2f6486-socket-dir\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818139 kubelet[2468]: I1002 20:41:13.346706    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/df7d8fb0-7726-4a14-858c-04cbad2f6486-registration-dir\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818139 kubelet[2468]: I1002 20:41:13.346729    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6981657c-eddf-4bb1-9959-fd0361528968-config-volume\") pod \"coredns-5dd5756b68-fc2vc\" (UID: \"6981657c-eddf-4bb1-9959-fd0361528968\") " pod="kube-system/coredns-5dd5756b68-fc2vc"
Oct  2 20:41:13.219946 systemd[1]: Created slice kubepods-besteffort-poddf7d8fb0_7726_4a14_858c_04cbad2f6486.slice.
Oct  2 20:41:13.818939 kubelet[2468]: I1002 20:41:13.346787    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/94088da4-a637-4a4f-8d7a-846ff32d11fa-config-volume\") pod \"coredns-5dd5756b68-ln7nz\" (UID: \"94088da4-a637-4a4f-8d7a-846ff32d11fa\") " pod="kube-system/coredns-5dd5756b68-ln7nz"
Oct  2 20:41:13.818939 kubelet[2468]: I1002 20:41:13.346810    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/df7d8fb0-7726-4a14-858c-04cbad2f6486-varrun\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818939 kubelet[2468]: I1002 20:41:13.346871    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/df7d8fb0-7726-4a14-858c-04cbad2f6486-etccalico\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818939 kubelet[2468]: I1002 20:41:13.346895    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/df7d8fb0-7726-4a14-858c-04cbad2f6486-kubelet-dir\") pod \"csi-node-driver-nkzvw\" (UID: \"df7d8fb0-7726-4a14-858c-04cbad2f6486\") " pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:13.818939 kubelet[2468]: I1002 20:41:13.346914    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pgh77\" (UniqueName: \"kubernetes.io/projected/94088da4-a637-4a4f-8d7a-846ff32d11fa-kube-api-access-pgh77\") pod \"coredns-5dd5756b68-ln7nz\" (UID: \"94088da4-a637-4a4f-8d7a-846ff32d11fa\") " pod="kube-system/coredns-5dd5756b68-ln7nz"
Oct  2 20:41:13.819081 kubelet[2468]: I1002 20:41:13.346964    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sd7pg\" (UniqueName: \"kubernetes.io/projected/6981657c-eddf-4bb1-9959-fd0361528968-kube-api-access-sd7pg\") pod \"coredns-5dd5756b68-fc2vc\" (UID: \"6981657c-eddf-4bb1-9959-fd0361528968\") " pod="kube-system/coredns-5dd5756b68-fc2vc"
Oct  2 20:41:14.088991 env[1379]: time="2023-10-02T20:41:14.088872850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ln7nz,Uid:94088da4-a637-4a4f-8d7a-846ff32d11fa,Namespace:kube-system,Attempt:0,}"
Oct  2 20:41:14.095463 env[1379]: time="2023-10-02T20:41:14.095422947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-f7qmn,Uid:ec53cbea-214c-4e27-8cd8-8227d8c2f7ec,Namespace:calico-system,Attempt:0,}"
Oct  2 20:41:14.104886 env[1379]: time="2023-10-02T20:41:14.104842065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fc2vc,Uid:6981657c-eddf-4bb1-9959-fd0361528968,Namespace:kube-system,Attempt:0,}"
Oct  2 20:41:14.121341 env[1379]: time="2023-10-02T20:41:14.121146414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nkzvw,Uid:df7d8fb0-7726-4a14-858c-04cbad2f6486,Namespace:calico-system,Attempt:0,}"
Oct  2 20:41:14.628414 env[1379]: time="2023-10-02T20:41:14.628345025Z" level=info msg="shim disconnected" id=cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2
Oct  2 20:41:14.628414 env[1379]: time="2023-10-02T20:41:14.628411659Z" level=warning msg="cleaning up after shim disconnected" id=cf660d5c7f5c459194bbf55338aa955952f30654464cf9d309d9aab7e3decec2 namespace=k8s.io
Oct  2 20:41:14.628790 env[1379]: time="2023-10-02T20:41:14.628422739Z" level=info msg="cleaning up dead shim"
Oct  2 20:41:14.641456 env[1379]: time="2023-10-02T20:41:14.641410462Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:41:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3099 runtime=io.containerd.runc.v2\n"
Oct  2 20:41:14.781672 env[1379]: time="2023-10-02T20:41:14.781634225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 20:41:14.868596 env[1379]: time="2023-10-02T20:41:14.868510280Z" level=error msg="Failed to destroy network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.869884 env[1379]: time="2023-10-02T20:41:14.869844498Z" level=error msg="encountered an error cleaning up failed sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.870021 env[1379]: time="2023-10-02T20:41:14.869996366Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ln7nz,Uid:94088da4-a637-4a4f-8d7a-846ff32d11fa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.872660 kubelet[2468]: E1002 20:41:14.870307    2468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.872660 kubelet[2468]: E1002 20:41:14.870409    2468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ln7nz"
Oct  2 20:41:14.872660 kubelet[2468]: E1002 20:41:14.870429    2468 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ln7nz"
Oct  2 20:41:14.871757 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a-shm.mount: Deactivated successfully.
Oct  2 20:41:14.873707 kubelet[2468]: E1002 20:41:14.870516    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-ln7nz_kube-system(94088da4-a637-4a4f-8d7a-846ff32d11fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-ln7nz_kube-system(94088da4-a637-4a4f-8d7a-846ff32d11fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ln7nz" podUID="94088da4-a637-4a4f-8d7a-846ff32d11fa"
Oct  2 20:41:14.921401 env[1379]: time="2023-10-02T20:41:14.920737554Z" level=error msg="Failed to destroy network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.924586 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90-shm.mount: Deactivated successfully.
Oct  2 20:41:14.925701 env[1379]: time="2023-10-02T20:41:14.925657456Z" level=error msg="encountered an error cleaning up failed sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.925873 env[1379]: time="2023-10-02T20:41:14.925845682Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-f7qmn,Uid:ec53cbea-214c-4e27-8cd8-8227d8c2f7ec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.926267 kubelet[2468]: E1002 20:41:14.926229    2468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.926353 kubelet[2468]: E1002 20:41:14.926295    2468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn"
Oct  2 20:41:14.926353 kubelet[2468]: E1002 20:41:14.926315    2468 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn"
Oct  2 20:41:14.926428 kubelet[2468]: E1002 20:41:14.926409    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-f7qmn_calico-system(ec53cbea-214c-4e27-8cd8-8227d8c2f7ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-f7qmn_calico-system(ec53cbea-214c-4e27-8cd8-8227d8c2f7ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn" podUID="ec53cbea-214c-4e27-8cd8-8227d8c2f7ec"
Oct  2 20:41:14.944725 env[1379]: time="2023-10-02T20:41:14.944671478Z" level=error msg="Failed to destroy network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.945228 env[1379]: time="2023-10-02T20:41:14.945196238Z" level=error msg="encountered an error cleaning up failed sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.945354 env[1379]: time="2023-10-02T20:41:14.945329587Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nkzvw,Uid:df7d8fb0-7726-4a14-858c-04cbad2f6486,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.947800 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c-shm.mount: Deactivated successfully.
Oct  2 20:41:14.948908 kubelet[2468]: E1002 20:41:14.948511    2468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.948908 kubelet[2468]: E1002 20:41:14.948559    2468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:14.948908 kubelet[2468]: E1002 20:41:14.948581    2468 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nkzvw"
Oct  2 20:41:14.949007 kubelet[2468]: E1002 20:41:14.948643    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:14.953873 env[1379]: time="2023-10-02T20:41:14.953833135Z" level=error msg="Failed to destroy network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.955473 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9-shm.mount: Deactivated successfully.
Oct  2 20:41:14.956980 env[1379]: time="2023-10-02T20:41:14.956685396Z" level=error msg="encountered an error cleaning up failed sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.956980 env[1379]: time="2023-10-02T20:41:14.956766510Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fc2vc,Uid:6981657c-eddf-4bb1-9959-fd0361528968,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.959188 kubelet[2468]: E1002 20:41:14.957210    2468 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:14.959188 kubelet[2468]: E1002 20:41:14.957250    2468 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fc2vc"
Oct  2 20:41:14.959188 kubelet[2468]: E1002 20:41:14.957268    2468 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fc2vc"
Oct  2 20:41:14.959872 kubelet[2468]: E1002 20:41:14.957322    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-fc2vc_kube-system(6981657c-eddf-4bb1-9959-fd0361528968)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-fc2vc_kube-system(6981657c-eddf-4bb1-9959-fd0361528968)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fc2vc" podUID="6981657c-eddf-4bb1-9959-fd0361528968"
Oct  2 20:41:15.782584 kubelet[2468]: I1002 20:41:15.782552    2468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:15.783634 env[1379]: time="2023-10-02T20:41:15.783602141Z" level=info msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\""
Oct  2 20:41:15.789012 kubelet[2468]: I1002 20:41:15.788915    2468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:15.790866 env[1379]: time="2023-10-02T20:41:15.790826236Z" level=info msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\""
Oct  2 20:41:15.792927 kubelet[2468]: I1002 20:41:15.792902    2468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:15.796445 env[1379]: time="2023-10-02T20:41:15.796404215Z" level=info msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\""
Oct  2 20:41:15.797889 kubelet[2468]: I1002 20:41:15.797466    2468 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:15.799280 env[1379]: time="2023-10-02T20:41:15.799245361Z" level=info msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\""
Oct  2 20:41:15.868139 env[1379]: time="2023-10-02T20:41:15.868084050Z" level=error msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" failed" error="failed to destroy network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:15.868625 kubelet[2468]: E1002 20:41:15.868600    2468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:15.868709 kubelet[2468]: E1002 20:41:15.868685    2468 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"}
Oct  2 20:41:15.868738 kubelet[2468]: E1002 20:41:15.868730    2468 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6981657c-eddf-4bb1-9959-fd0361528968\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 20:41:15.868793 kubelet[2468]: E1002 20:41:15.868759    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6981657c-eddf-4bb1-9959-fd0361528968\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fc2vc" podUID="6981657c-eddf-4bb1-9959-fd0361528968"
Oct  2 20:41:15.889956 env[1379]: time="2023-10-02T20:41:15.889900804Z" level=error msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" failed" error="failed to destroy network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:15.890393 kubelet[2468]: E1002 20:41:15.890352    2468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:15.890651 kubelet[2468]: E1002 20:41:15.890412    2468 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"}
Oct  2 20:41:15.890651 kubelet[2468]: E1002 20:41:15.890461    2468 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"df7d8fb0-7726-4a14-858c-04cbad2f6486\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 20:41:15.890651 kubelet[2468]: E1002 20:41:15.890489    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"df7d8fb0-7726-4a14-858c-04cbad2f6486\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:15.917494 env[1379]: time="2023-10-02T20:41:15.917422569Z" level=error msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" failed" error="failed to destroy network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:15.917833 kubelet[2468]: E1002 20:41:15.917801    2468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:15.917909 kubelet[2468]: E1002 20:41:15.917850    2468 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"}
Oct  2 20:41:15.917909 kubelet[2468]: E1002 20:41:15.917895    2468 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"94088da4-a637-4a4f-8d7a-846ff32d11fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 20:41:15.917988 kubelet[2468]: E1002 20:41:15.917923    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"94088da4-a637-4a4f-8d7a-846ff32d11fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ln7nz" podUID="94088da4-a637-4a4f-8d7a-846ff32d11fa"
Oct  2 20:41:15.926172 env[1379]: time="2023-10-02T20:41:15.926115873Z" level=error msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" failed" error="failed to destroy network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 20:41:15.926634 kubelet[2468]: E1002 20:41:15.926591    2468 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:15.926826 kubelet[2468]: E1002 20:41:15.926648    2468 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"}
Oct  2 20:41:15.926826 kubelet[2468]: E1002 20:41:15.926701    2468 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 20:41:15.926826 kubelet[2468]: E1002 20:41:15.926729    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn" podUID="ec53cbea-214c-4e27-8cd8-8227d8c2f7ec"
Oct  2 20:41:18.482663 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1571364770.mount: Deactivated successfully.
Oct  2 20:41:18.682571 env[1379]: time="2023-10-02T20:41:18.682525219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:18.696042 env[1379]: time="2023-10-02T20:41:18.695998733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:18.701212 env[1379]: time="2023-10-02T20:41:18.701169922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:18.707104 env[1379]: time="2023-10-02T20:41:18.707076818Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:18.707594 env[1379]: time="2023-10-02T20:41:18.707557064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\""
Oct  2 20:41:18.712177 env[1379]: time="2023-10-02T20:41:18.712140935Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Oct  2 20:41:18.745704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4248085842.mount: Deactivated successfully.
Oct  2 20:41:18.749169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3414418289.mount: Deactivated successfully.
Oct  2 20:41:18.769460 env[1379]: time="2023-10-02T20:41:18.769407426Z" level=info msg="CreateContainer within sandbox \"f2c6658858310abf9e864ecacd00f5cc706d5760a266fba864360b860316fd00\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d\""
Oct  2 20:41:18.771570 env[1379]: time="2023-10-02T20:41:18.770201409Z" level=info msg="StartContainer for \"e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d\""
Oct  2 20:41:18.791436 systemd[1]: Started cri-containerd-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d.scope.
Oct  2 20:41:18.826808 kernel: kauditd_printk_skb: 34 callbacks suppressed
Oct  2 20:41:18.826967 kernel: audit: type=1400 audit(1696279278.814:1124): avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2852 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:18.871327 kernel: audit: type=1300 audit(1696279278.814:1124): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2852 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:18.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539646438666464663435626137306663646338393036303061653232
Oct  2 20:41:18.896189 kernel: audit: type=1327 audit(1696279278.814:1124): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539646438666464663435626137306663646338393036303061653232
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.913683 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.931762 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.950940 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.951284 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.969193 env[1379]: time="2023-10-02T20:41:18.969151657Z" level=info msg="StartContainer for \"e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d\" returns successfully"
Oct  2 20:41:18.986736 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.986853 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:19.022153 kernel: audit: type=1400 audit(1696279278.814:1125): avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.814000 audit: BPF prog-id=143 op=LOAD
Oct  2 20:41:18.814000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2852 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:18.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539646438666464663435626137306663646338393036303061653232
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit: BPF prog-id=144 op=LOAD
Oct  2 20:41:18.815000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2852 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:18.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539646438666464663435626137306663646338393036303061653232
Oct  2 20:41:18.815000 audit: BPF prog-id=144 op=UNLOAD
Oct  2 20:41:18.815000 audit: BPF prog-id=143 op=UNLOAD
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { perfmon } for  pid=3327 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit[3327]: AVC avc:  denied  { bpf } for  pid=3327 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:18.815000 audit: BPF prog-id=145 op=LOAD
Oct  2 20:41:18.815000 audit[3327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2852 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:18.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539646438666464663435626137306663646338393036303061653232
Oct  2 20:41:19.318487 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Oct  2 20:41:19.318681 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct  2 20:41:19.823009 kubelet[2468]: I1002 20:41:19.822432    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4s5pq" podStartSLOduration=1.722589878 podCreationTimestamp="2023-10-02 20:41:04 +0000 UTC" firstStartedPulling="2023-10-02 20:41:04.608049415 +0000 UTC m=+21.114807508" lastFinishedPulling="2023-10-02 20:41:18.707853082 +0000 UTC m=+35.214611175" observedRunningTime="2023-10-02 20:41:19.821282184 +0000 UTC m=+36.328040277" watchObservedRunningTime="2023-10-02 20:41:19.822393545 +0000 UTC m=+36.329151638"
Oct  2 20:41:19.834175 systemd[1]: run-containerd-runc-k8s.io-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d-runc.V6H7D7.mount: Deactivated successfully.
Oct  2 20:41:20.718000 audit[3466]: AVC avc:  denied  { write } for  pid=3466 comm="tee" name="fd" dev="proc" ino=23301 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.718000 audit[3468]: AVC avc:  denied  { write } for  pid=3468 comm="tee" name="fd" dev="proc" ino=23302 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.718000 audit[3468]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9f9a972 a2=241 a3=1b6 items=1 ppid=3421 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.718000 audit: CWD cwd="/etc/service/enabled/bird/log"
Oct  2 20:41:20.718000 audit: PATH item=0 name="/dev/fd/63" inode=23295 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.718000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.718000 audit[3466]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedadb971 a2=241 a3=1b6 items=1 ppid=3423 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.718000 audit: CWD cwd="/etc/service/enabled/felix/log"
Oct  2 20:41:20.718000 audit: PATH item=0 name="/dev/fd/63" inode=23294 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.718000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.722000 audit[3461]: AVC avc:  denied  { write } for  pid=3461 comm="tee" name="fd" dev="proc" ino=24055 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.722000 audit[3461]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd02f8962 a2=241 a3=1b6 items=1 ppid=3426 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.722000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Oct  2 20:41:20.724000 audit[3464]: AVC avc:  denied  { write } for  pid=3464 comm="tee" name="fd" dev="proc" ino=24059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.724000 audit[3464]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3337973 a2=241 a3=1b6 items=1 ppid=3417 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.724000 audit: CWD cwd="/etc/service/enabled/cni/log"
Oct  2 20:41:20.722000 audit: PATH item=0 name="/dev/fd/63" inode=24049 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.722000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.738000 audit[3458]: AVC avc:  denied  { write } for  pid=3458 comm="tee" name="fd" dev="proc" ino=24075 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.738000 audit[3458]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0495971 a2=241 a3=1b6 items=1 ppid=3411 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.738000 audit: CWD cwd="/etc/service/enabled/confd/log"
Oct  2 20:41:20.724000 audit: PATH item=0 name="/dev/fd/63" inode=23293 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.742000 audit[3470]: AVC avc:  denied  { write } for  pid=3470 comm="tee" name="fd" dev="proc" ino=24079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.742000 audit[3470]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd844e961 a2=241 a3=1b6 items=1 ppid=3419 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.742000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Oct  2 20:41:20.742000 audit: PATH item=0 name="/dev/fd/63" inode=23296 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.738000 audit: PATH item=0 name="/dev/fd/63" inode=23284 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.738000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.768000 audit[3483]: AVC avc:  denied  { write } for  pid=3483 comm="tee" name="fd" dev="proc" ino=23318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 20:41:20.768000 audit[3483]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffecfc2971 a2=241 a3=1b6 items=1 ppid=3412 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:20.768000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Oct  2 20:41:20.768000 audit: PATH item=0 name="/dev/fd/63" inode=23305 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 20:41:20.768000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 20:41:20.830320 systemd[1]: run-containerd-runc-k8s.io-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d-runc.xDfFur.mount: Deactivated successfully.
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit: BPF prog-id=146 op=LOAD
Oct  2 20:41:21.277000 audit[3575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb3fcc78 a2=70 a3=0 items=0 ppid=3424 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.277000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 20:41:21.277000 audit: BPF prog-id=146 op=UNLOAD
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit: BPF prog-id=147 op=LOAD
Oct  2 20:41:21.277000 audit[3575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb3fcc78 a2=70 a3=4a174c items=0 ppid=3424 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.277000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 20:41:21.277000 audit: BPF prog-id=147 op=UNLOAD
Oct  2 20:41:21.277000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.277000 audit[3575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffcb3fcca8 a2=70 a3=104a379f items=0 ppid=3424 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.277000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { perfmon } for  pid=3575 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit[3575]: AVC avc:  denied  { bpf } for  pid=3575 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.279000 audit: BPF prog-id=148 op=LOAD
Oct  2 20:41:21.279000 audit[3575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffcb3fcbf8 a2=70 a3=104a37b9 items=0 ppid=3424 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 20:41:21.288000 audit[3579]: AVC avc:  denied  { bpf } for  pid=3579 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.288000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdcc59d08 a2=70 a3=0 items=0 ppid=3424 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.288000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 20:41:21.288000 audit[3579]: AVC avc:  denied  { bpf } for  pid=3579 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:21.288000 audit[3579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffdcc59be8 a2=70 a3=2 items=0 ppid=3424 pid=3579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.288000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 20:41:21.295000 audit: BPF prog-id=148 op=UNLOAD
Oct  2 20:41:21.392000 audit[3601]: NETFILTER_CFG table=mangle:103 family=2 entries=19 op=nft_register_chain pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:21.392000 audit[3601]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe3160bb0 a2=0 a3=ffff8208cfa0 items=0 ppid=3424 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.392000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:21.403000 audit[3600]: NETFILTER_CFG table=raw:104 family=2 entries=19 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:21.403000 audit[3600]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffd03980b0 a2=0 a3=ffff97ed6fa0 items=0 ppid=3424 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.403000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:21.404000 audit[3602]: NETFILTER_CFG table=nat:105 family=2 entries=16 op=nft_register_chain pid=3602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:21.404000 audit[3602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffff56f6150 a2=0 a3=ffff925e3fa0 items=0 ppid=3424 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:21.406000 audit[3603]: NETFILTER_CFG table=filter:106 family=2 entries=39 op=nft_register_chain pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:21.406000 audit[3603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc32f2ab0 a2=0 a3=ffff94690fa0 items=0 ppid=3424 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:21.406000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:22.149968 systemd-networkd[1509]: vxlan.calico: Link UP
Oct  2 20:41:22.149976 systemd-networkd[1509]: vxlan.calico: Gained carrier
Oct  2 20:41:24.035487 systemd-networkd[1509]: vxlan.calico: Gained IPv6LL
Oct  2 20:41:24.499117 systemd[1]: run-containerd-runc-k8s.io-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d-runc.dni0ju.mount: Deactivated successfully.
Oct  2 20:41:26.687394 env[1379]: time="2023-10-02T20:41:26.686984539Z" level=info msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\""
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.743 [INFO][3678] k8s.go 576: Cleaning up netns ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.744 [INFO][3678] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" iface="eth0" netns="/var/run/netns/cni-40518095-df4d-ba75-2690-5b12298eadc6"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.744 [INFO][3678] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" iface="eth0" netns="/var/run/netns/cni-40518095-df4d-ba75-2690-5b12298eadc6"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.744 [INFO][3678] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" iface="eth0" netns="/var/run/netns/cni-40518095-df4d-ba75-2690-5b12298eadc6"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.744 [INFO][3678] k8s.go 583: Releasing IP address(es) ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.744 [INFO][3678] utils.go 196: Calico CNI releasing IP address ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.772 [INFO][3684] ipam_plugin.go 416: Releasing address using handleID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.785669 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:26.785669 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.781 [WARNING][3684] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.782 [INFO][3684] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.785669 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:26.785669 env[1379]: 2023-10-02 20:41:26.784 [INFO][3678] k8s.go 589: Teardown processing complete. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:26.788396 env[1379]: time="2023-10-02T20:41:26.787516595Z" level=info msg="TearDown network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" successfully"
Oct  2 20:41:26.788396 env[1379]: time="2023-10-02T20:41:26.787558352Z" level=info msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" returns successfully"
Oct  2 20:41:26.788783 systemd[1]: run-netns-cni\x2d40518095\x2ddf4d\x2dba75\x2d2690\x2d5b12298eadc6.mount: Deactivated successfully.
Oct  2 20:41:26.789923 env[1379]: time="2023-10-02T20:41:26.789892084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-f7qmn,Uid:ec53cbea-214c-4e27-8cd8-8227d8c2f7ec,Namespace:calico-system,Attempt:1,}"
Oct  2 20:41:26.967765 systemd-networkd[1509]: cali17c95d30659: Link UP
Oct  2 20:41:26.975478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17c95d30659: link becomes ready
Oct  2 20:41:26.975375 systemd-networkd[1509]: cali17c95d30659: Gained carrier
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.890 [INFO][3691] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0 calico-kube-controllers-74b9887bb6- calico-system  ec53cbea-214c-4e27-8cd8-8227d8c2f7ec 665 0 2023-10-02 20:41:04 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  calico-kube-controllers-74b9887bb6-f7qmn eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] cali17c95d30659  [] []}} ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.890 [INFO][3691] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.923 [INFO][3703] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" HandleID="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.935 [INFO][3703] ipam_plugin.go 269: Auto assigning IP ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" HandleID="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d840), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-c505880dad", "pod":"calico-kube-controllers-74b9887bb6-f7qmn", "timestamp":"2023-10-02 20:41:26.923531837 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:26.986539 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:26.986539 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.935 [INFO][3703] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.937 [INFO][3703] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.941 [INFO][3703] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.944 [INFO][3703] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.945 [INFO][3703] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.947 [INFO][3703] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.948 [INFO][3703] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.949 [INFO][3703] ipam.go 1682: Creating new handle: k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.953 [INFO][3703] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.956 [INFO][3703] ipam.go 1216: Successfully claimed IPs: [192.168.42.65/26] block=192.168.42.64/26 handle="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.956 [INFO][3703] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.65/26] handle="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:26.986539 env[1379]: time="2023-10-02T20:41:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:26.986539 env[1379]: 2023-10-02 20:41:26.956 [INFO][3703] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.65/26] IPv6=[] ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" HandleID="k8s-pod-network.a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.959 [INFO][3691] k8s.go 383: Populated endpoint ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec", ResourceVersion:"665", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-f7qmn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.42.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17c95d30659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.959 [INFO][3691] k8s.go 384: Calico CNI using IPs: [192.168.42.65/32] ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.959 [INFO][3691] dataplane_linux.go 68: Setting the host side veth name to cali17c95d30659 ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.960 [INFO][3691] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.975 [INFO][3691] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec", ResourceVersion:"665", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8", Pod:"calico-kube-controllers-74b9887bb6-f7qmn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.42.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17c95d30659", MAC:"2e:93:27:3c:a1:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:26.987255 env[1379]: 2023-10-02 20:41:26.983 [INFO][3691] k8s.go 489: Wrote updated endpoint to datastore ContainerID="a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-f7qmn" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:27.018237 env[1379]: time="2023-10-02T20:41:27.018162644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:27.018237 env[1379]: time="2023-10-02T20:41:27.018203361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:27.018437 env[1379]: time="2023-10-02T20:41:27.018228120Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:27.018437 env[1379]: time="2023-10-02T20:41:27.018400509Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8 pid=3731 runtime=io.containerd.runc.v2
Oct  2 20:41:27.033682 kernel: kauditd_printk_skb: 129 callbacks suppressed
Oct  2 20:41:27.033814 kernel: audit: type=1325 audit(1696279287.026:1150): table=filter:107 family=2 entries=36 op=nft_register_chain pid=3739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:27.026000 audit[3739]: NETFILTER_CFG table=filter:107 family=2 entries=36 op=nft_register_chain pid=3739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:27.043037 systemd[1]: Started cri-containerd-a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8.scope.
Oct  2 20:41:27.026000 audit[3739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdac83b10 a2=0 a3=ffffa45dcfa0 items=0 ppid=3424 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.078317 kernel: audit: type=1300 audit(1696279287.026:1150): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdac83b10 a2=0 a3=ffffa45dcfa0 items=0 ppid=3424 pid=3739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.026000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:27.096800 kernel: audit: type=1327 audit(1696279287.026:1150): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:27.115814 kernel: audit: type=1400 audit(1696279287.098:1151): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133188 kernel: audit: type=1400 audit(1696279287.098:1152): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.151175 kernel: audit: type=1400 audit(1696279287.098:1153): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.151259 kernel: audit: type=1400 audit(1696279287.098:1154): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.192453 kernel: audit: type=1400 audit(1696279287.098:1155): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.211287 kernel: audit: type=1400 audit(1696279287.098:1156): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.229386 kernel: audit: type=1400 audit(1696279287.098:1157): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.098000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit: BPF prog-id=149 op=LOAD
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363739343534316138386665346662636338643236356433643539
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363739343534316138386665346662636338643236356433643539
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.116000 audit: BPF prog-id=150 op=LOAD
Oct  2 20:41:27.116000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363739343534316138386665346662636338643236356433643539
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit: BPF prog-id=151 op=LOAD
Oct  2 20:41:27.133000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363739343534316138386665346662636338643236356433643539
Oct  2 20:41:27.133000 audit: BPF prog-id=151 op=UNLOAD
Oct  2 20:41:27.133000 audit: BPF prog-id=150 op=UNLOAD
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { perfmon } for  pid=3741 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit[3741]: AVC avc:  denied  { bpf } for  pid=3741 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:27.133000 audit: BPF prog-id=152 op=LOAD
Oct  2 20:41:27.133000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:27.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136363739343534316138386665346662636338643236356433643539
Oct  2 20:41:27.244409 env[1379]: time="2023-10-02T20:41:27.244342562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-f7qmn,Uid:ec53cbea-214c-4e27-8cd8-8227d8c2f7ec,Namespace:calico-system,Attempt:1,} returns sandbox id \"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8\""
Oct  2 20:41:27.246395 env[1379]: time="2023-10-02T20:41:27.245900944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\""
Oct  2 20:41:27.688595 env[1379]: time="2023-10-02T20:41:27.688544629Z" level=info msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\""
Oct  2 20:41:27.689347 env[1379]: time="2023-10-02T20:41:27.689312221Z" level=info msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\""
Oct  2 20:41:27.787328 systemd[1]: run-containerd-runc-k8s.io-a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8-runc.2sIlUG.mount: Deactivated successfully.
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.772 [INFO][3795] k8s.go 576: Cleaning up netns ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.772 [INFO][3795] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" iface="eth0" netns="/var/run/netns/cni-dc01b6ff-a63f-d06a-e9d4-afc6faf54110"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.772 [INFO][3795] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" iface="eth0" netns="/var/run/netns/cni-dc01b6ff-a63f-d06a-e9d4-afc6faf54110"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.772 [INFO][3795] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" iface="eth0" netns="/var/run/netns/cni-dc01b6ff-a63f-d06a-e9d4-afc6faf54110"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.773 [INFO][3795] k8s.go 583: Releasing IP address(es) ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.773 [INFO][3795] utils.go 196: Calico CNI releasing IP address ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.825 [INFO][3806] ipam_plugin.go 416: Releasing address using handleID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:27.838399 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:27.838399 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.835 [WARNING][3806] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.835 [INFO][3806] ipam_plugin.go 444: Releasing address using workloadID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:27.838399 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:27.838399 env[1379]: 2023-10-02 20:41:27.837 [INFO][3795] k8s.go 589: Teardown processing complete. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:27.840919 env[1379]: time="2023-10-02T20:41:27.840884410Z" level=info msg="TearDown network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" successfully"
Oct  2 20:41:27.841014 env[1379]: time="2023-10-02T20:41:27.840998683Z" level=info msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" returns successfully"
Oct  2 20:41:27.841608 systemd[1]: run-netns-cni\x2ddc01b6ff\x2da63f\x2dd06a\x2de9d4\x2dafc6faf54110.mount: Deactivated successfully.
Oct  2 20:41:27.842305 env[1379]: time="2023-10-02T20:41:27.842276963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fc2vc,Uid:6981657c-eddf-4bb1-9959-fd0361528968,Namespace:kube-system,Attempt:1,}"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.782 [INFO][3794] k8s.go 576: Cleaning up netns ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.782 [INFO][3794] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" iface="eth0" netns="/var/run/netns/cni-00020ea1-ea55-207b-e424-4aaeaed05c71"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.783 [INFO][3794] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" iface="eth0" netns="/var/run/netns/cni-00020ea1-ea55-207b-e424-4aaeaed05c71"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.783 [INFO][3794] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" iface="eth0" netns="/var/run/netns/cni-00020ea1-ea55-207b-e424-4aaeaed05c71"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.783 [INFO][3794] k8s.go 583: Releasing IP address(es) ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.783 [INFO][3794] utils.go 196: Calico CNI releasing IP address ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.839 [INFO][3811] ipam_plugin.go 416: Releasing address using handleID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:27.857578 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:27.857578 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.851 [WARNING][3811] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.851 [INFO][3811] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:27.857578 env[1379]: time="2023-10-02T20:41:27Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:27.857578 env[1379]: 2023-10-02 20:41:27.855 [INFO][3794] k8s.go 589: Teardown processing complete. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:27.858135 env[1379]: time="2023-10-02T20:41:27.858107612Z" level=info msg="TearDown network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" successfully"
Oct  2 20:41:27.858217 env[1379]: time="2023-10-02T20:41:27.858201486Z" level=info msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" returns successfully"
Oct  2 20:41:27.858944 env[1379]: time="2023-10-02T20:41:27.858914601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ln7nz,Uid:94088da4-a637-4a4f-8d7a-846ff32d11fa,Namespace:kube-system,Attempt:1,}"
Oct  2 20:41:27.861026 systemd[1]: run-netns-cni\x2d00020ea1\x2dea55\x2d207b\x2de424\x2d4aaeaed05c71.mount: Deactivated successfully.
Oct  2 20:41:28.087078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 20:41:28.087237 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf269ed7bb0: link becomes ready
Oct  2 20:41:28.094907 systemd-networkd[1509]: calidf269ed7bb0: Link UP
Oct  2 20:41:28.094913 systemd-networkd[1509]: calidf269ed7bb0: Gained carrier
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:27.981 [INFO][3818] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0 coredns-5dd5756b68- kube-system  94088da4-a637-4a4f-8d7a-846ff32d11fa 675 0 2023-10-02 20:40:58 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  coredns-5dd5756b68-ln7nz eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] calidf269ed7bb0  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:27.982 [INFO][3818] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.030 [INFO][3840] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" HandleID="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.043 [INFO][3840] ipam_plugin.go 269: Auto assigning IP ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" HandleID="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000499440), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-c505880dad", "pod":"coredns-5dd5756b68-ln7nz", "timestamp":"2023-10-02 20:41:28.03039585 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:28.120851 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:28.120851 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.043 [INFO][3840] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.045 [INFO][3840] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.049 [INFO][3840] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.053 [INFO][3840] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.055 [INFO][3840] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.057 [INFO][3840] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.057 [INFO][3840] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.059 [INFO][3840] ipam.go 1682: Creating new handle: k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.061 [INFO][3840] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.069 [INFO][3840] ipam.go 1216: Successfully claimed IPs: [192.168.42.66/26] block=192.168.42.64/26 handle="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.069 [INFO][3840] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.66/26] handle="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.120851 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:28.120851 env[1379]: 2023-10-02 20:41:28.069 [INFO][3840] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.66/26] IPv6=[] ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" HandleID="k8s-pod-network.4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.070 [INFO][3818] k8s.go 383: Populated endpoint ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"94088da4-a637-4a4f-8d7a-846ff32d11fa", ResourceVersion:"675", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"coredns-5dd5756b68-ln7nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf269ed7bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.071 [INFO][3818] k8s.go 384: Calico CNI using IPs: [192.168.42.66/32] ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.071 [INFO][3818] dataplane_linux.go 68: Setting the host side veth name to calidf269ed7bb0 ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.088 [INFO][3818] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.094 [INFO][3818] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"94088da4-a637-4a4f-8d7a-846ff32d11fa", ResourceVersion:"675", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed", Pod:"coredns-5dd5756b68-ln7nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf269ed7bb0", MAC:"3e:de:87:45:61:1f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:28.121469 env[1379]: 2023-10-02 20:41:28.119 [INFO][3818] k8s.go 489: Wrote updated endpoint to datastore ContainerID="4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed" Namespace="kube-system" Pod="coredns-5dd5756b68-ln7nz" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:28.163000 audit[3878]: NETFILTER_CFG table=filter:108 family=2 entries=40 op=nft_register_chain pid=3878 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:28.163000 audit[3878]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=fffff18e2b80 a2=0 a3=ffffaf06cfa0 items=0 ppid=3424 pid=3878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.163000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:28.170886 env[1379]: time="2023-10-02T20:41:28.160697644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:28.170886 env[1379]: time="2023-10-02T20:41:28.160740841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:28.170886 env[1379]: time="2023-10-02T20:41:28.160752400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:28.170886 env[1379]: time="2023-10-02T20:41:28.160891472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed pid=3877 runtime=io.containerd.runc.v2
Oct  2 20:41:28.179410 systemd[1]: Started cri-containerd-4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed.scope.
Oct  2 20:41:28.202403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ee15e8ee8d: link becomes ready
Oct  2 20:41:28.210254 systemd-networkd[1509]: cali7ee15e8ee8d: Link UP
Oct  2 20:41:28.210262 systemd-networkd[1509]: cali7ee15e8ee8d: Gained carrier
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit: BPF prog-id=153 op=LOAD
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316233646131373435343362643630616531313664633939396566
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316233646131373435343362643630616531313664633939396566
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit: BPF prog-id=154 op=LOAD
Oct  2 20:41:28.224000 audit[3886]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316233646131373435343362643630616531313664633939396566
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.224000 audit: BPF prog-id=155 op=LOAD
Oct  2 20:41:28.224000 audit[3886]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316233646131373435343362643630616531313664633939396566
Oct  2 20:41:28.224000 audit: BPF prog-id=155 op=UNLOAD
Oct  2 20:41:28.225000 audit: BPF prog-id=154 op=UNLOAD
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { perfmon } for  pid=3886 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit[3886]: AVC avc:  denied  { bpf } for  pid=3886 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.225000 audit: BPF prog-id=156 op=LOAD
Oct  2 20:41:28.225000 audit[3886]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3877 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466316233646131373435343362643630616531313664633939396566
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.017 [INFO][3828] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0 coredns-5dd5756b68- kube-system  6981657c-eddf-4bb1-9959-fd0361528968 674 0 2023-10-02 20:40:58 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  coredns-5dd5756b68-fc2vc eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali7ee15e8ee8d  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.017 [INFO][3828] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.101 [INFO][3847] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" HandleID="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.117 [INFO][3847] ipam_plugin.go 269: Auto assigning IP ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" HandleID="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000417e90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-c505880dad", "pod":"coredns-5dd5756b68-fc2vc", "timestamp":"2023-10-02 20:41:28.10101017 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:28.236044 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:28.236044 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.117 [INFO][3847] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.125 [INFO][3847] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.139 [INFO][3847] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.143 [INFO][3847] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.147 [INFO][3847] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.151 [INFO][3847] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.151 [INFO][3847] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.170 [INFO][3847] ipam.go 1682: Creating new handle: k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.175 [INFO][3847] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.188 [INFO][3847] ipam.go 1216: Successfully claimed IPs: [192.168.42.67/26] block=192.168.42.64/26 handle="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.188 [INFO][3847] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.67/26] handle="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:28.236044 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:28.236044 env[1379]: 2023-10-02 20:41:28.188 [INFO][3847] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.67/26] IPv6=[] ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" HandleID="k8s-pod-network.54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.192 [INFO][3828] k8s.go 383: Populated endpoint ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6981657c-eddf-4bb1-9959-fd0361528968", ResourceVersion:"674", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"coredns-5dd5756b68-fc2vc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ee15e8ee8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.192 [INFO][3828] k8s.go 384: Calico CNI using IPs: [192.168.42.67/32] ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.192 [INFO][3828] dataplane_linux.go 68: Setting the host side veth name to cali7ee15e8ee8d ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.204 [INFO][3828] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.212 [INFO][3828] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6981657c-eddf-4bb1-9959-fd0361528968", ResourceVersion:"674", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719", Pod:"coredns-5dd5756b68-fc2vc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ee15e8ee8d", MAC:"ea:de:a3:59:92:e4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:28.238960 env[1379]: 2023-10-02 20:41:28.231 [INFO][3828] k8s.go 489: Wrote updated endpoint to datastore ContainerID="54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719" Namespace="kube-system" Pod="coredns-5dd5756b68-fc2vc" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:28.263000 audit[3921]: NETFILTER_CFG table=filter:109 family=2 entries=34 op=nft_register_chain pid=3921 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:28.263000 audit[3921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17900 a0=3 a1=ffffc6577600 a2=0 a3=ffffb0f22fa0 items=0 ppid=3424 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.263000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:28.267595 env[1379]: time="2023-10-02T20:41:28.267078995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ln7nz,Uid:94088da4-a637-4a4f-8d7a-846ff32d11fa,Namespace:kube-system,Attempt:1,} returns sandbox id \"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed\""
Oct  2 20:41:28.271049 env[1379]: time="2023-10-02T20:41:28.270934317Z" level=info msg="CreateContainer within sandbox \"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 20:41:28.314849 env[1379]: time="2023-10-02T20:41:28.304623916Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:28.314849 env[1379]: time="2023-10-02T20:41:28.304662874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:28.314849 env[1379]: time="2023-10-02T20:41:28.304672753Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:28.314849 env[1379]: time="2023-10-02T20:41:28.305006013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719 pid=3930 runtime=io.containerd.runc.v2
Oct  2 20:41:28.337817 systemd[1]: Started cri-containerd-54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719.scope.
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.366000 audit: BPF prog-id=157 op=LOAD
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3930 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534633434623363383465313131646130336538363133303734626437
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3930 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534633434623363383465313131646130336538363133303734626437
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit: BPF prog-id=158 op=LOAD
Oct  2 20:41:28.367000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3930 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534633434623363383465313131646130336538363133303734626437
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit: BPF prog-id=159 op=LOAD
Oct  2 20:41:28.367000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3930 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534633434623363383465313131646130336538363133303734626437
Oct  2 20:41:28.367000 audit: BPF prog-id=159 op=UNLOAD
Oct  2 20:41:28.367000 audit: BPF prog-id=158 op=UNLOAD
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { perfmon } for  pid=3941 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit[3941]: AVC avc:  denied  { bpf } for  pid=3941 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.367000 audit: BPF prog-id=160 op=LOAD
Oct  2 20:41:28.367000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3930 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534633434623363383465313131646130336538363133303734626437
Oct  2 20:41:28.370879 env[1379]: time="2023-10-02T20:41:28.370832708Z" level=info msg="CreateContainer within sandbox \"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2f7f99d40808eee96487f18ce8c577f9fb69dc6f05f7d18ea356b89a36301883\""
Oct  2 20:41:28.372185 env[1379]: time="2023-10-02T20:41:28.372153386Z" level=info msg="StartContainer for \"2f7f99d40808eee96487f18ce8c577f9fb69dc6f05f7d18ea356b89a36301883\""
Oct  2 20:41:28.388976 systemd-networkd[1509]: cali17c95d30659: Gained IPv6LL
Oct  2 20:41:28.413566 env[1379]: time="2023-10-02T20:41:28.413509872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fc2vc,Uid:6981657c-eddf-4bb1-9959-fd0361528968,Namespace:kube-system,Attempt:1,} returns sandbox id \"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719\""
Oct  2 20:41:28.419198 env[1379]: time="2023-10-02T20:41:28.419155764Z" level=info msg="CreateContainer within sandbox \"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 20:41:28.424740 systemd[1]: Started cri-containerd-2f7f99d40808eee96487f18ce8c577f9fb69dc6f05f7d18ea356b89a36301883.scope.
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.443000 audit: BPF prog-id=161 op=LOAD
Oct  2 20:41:28.444000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.444000 audit[3967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3877 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376639396434303830386565653936343837663138636538633537
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3877 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376639396434303830386565653936343837663138636538633537
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.445000 audit: BPF prog-id=162 op=LOAD
Oct  2 20:41:28.445000 audit[3967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3877 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376639396434303830386565653936343837663138636538633537
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.446000 audit: BPF prog-id=163 op=LOAD
Oct  2 20:41:28.446000 audit[3967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3877 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376639396434303830386565653936343837663138636538633537
Oct  2 20:41:28.447000 audit: BPF prog-id=163 op=UNLOAD
Oct  2 20:41:28.447000 audit: BPF prog-id=162 op=UNLOAD
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { perfmon } for  pid=3967 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit[3967]: AVC avc:  denied  { bpf } for  pid=3967 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.447000 audit: BPF prog-id=164 op=LOAD
Oct  2 20:41:28.447000 audit[3967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3877 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266376639396434303830386565653936343837663138636538633537
Oct  2 20:41:28.477734 env[1379]: time="2023-10-02T20:41:28.477686669Z" level=info msg="StartContainer for \"2f7f99d40808eee96487f18ce8c577f9fb69dc6f05f7d18ea356b89a36301883\" returns successfully"
Oct  2 20:41:28.560284 env[1379]: time="2023-10-02T20:41:28.560192415Z" level=info msg="CreateContainer within sandbox \"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a93b311ec0a9c292903e36ab5afb9c4c837175ceb53c73ed2b402b62207e80a\""
Oct  2 20:41:28.561034 env[1379]: time="2023-10-02T20:41:28.561007964Z" level=info msg="StartContainer for \"8a93b311ec0a9c292903e36ab5afb9c4c837175ceb53c73ed2b402b62207e80a\""
Oct  2 20:41:28.582409 systemd[1]: Started cri-containerd-8a93b311ec0a9c292903e36ab5afb9c4c837175ceb53c73ed2b402b62207e80a.scope.
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.600000 audit: BPF prog-id=165 op=LOAD
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3930 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861393362333131656330613963323932393033653336616235616662
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3930 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861393362333131656330613963323932393033653336616235616662
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.601000 audit: BPF prog-id=166 op=LOAD
Oct  2 20:41:28.601000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3930 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861393362333131656330613963323932393033653336616235616662
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.602000 audit: BPF prog-id=167 op=LOAD
Oct  2 20:41:28.602000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3930 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861393362333131656330613963323932393033653336616235616662
Oct  2 20:41:28.603000 audit: BPF prog-id=167 op=UNLOAD
Oct  2 20:41:28.603000 audit: BPF prog-id=166 op=UNLOAD
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { perfmon } for  pid=4010 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit[4010]: AVC avc:  denied  { bpf } for  pid=4010 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:28.603000 audit: BPF prog-id=168 op=LOAD
Oct  2 20:41:28.603000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3930 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861393362333131656330613963323932393033653336616235616662
Oct  2 20:41:28.653186 env[1379]: time="2023-10-02T20:41:28.653143115Z" level=info msg="StartContainer for \"8a93b311ec0a9c292903e36ab5afb9c4c837175ceb53c73ed2b402b62207e80a\" returns successfully"
Oct  2 20:41:28.687704 env[1379]: time="2023-10-02T20:41:28.687667583Z" level=info msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\""
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] k8s.go 576: Cleaning up netns ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" iface="eth0" netns="/var/run/netns/cni-e81030ca-74cf-6f7e-d55b-248fd0550554"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" iface="eth0" netns="/var/run/netns/cni-e81030ca-74cf-6f7e-d55b-248fd0550554"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" iface="eth0" netns="/var/run/netns/cni-e81030ca-74cf-6f7e-d55b-248fd0550554"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] k8s.go 583: Releasing IP address(es) ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.784 [INFO][4052] utils.go 196: Calico CNI releasing IP address ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.836 [INFO][4058] ipam_plugin.go 416: Releasing address using handleID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:28.854854 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:28.854854 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.846 [WARNING][4058] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.846 [INFO][4058] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:28.854854 env[1379]: time="2023-10-02T20:41:28Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:28.854854 env[1379]: 2023-10-02 20:41:28.849 [INFO][4052] k8s.go 589: Teardown processing complete. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:28.857209 systemd[1]: run-netns-cni\x2de81030ca\x2d74cf\x2d6f7e\x2dd55b\x2d248fd0550554.mount: Deactivated successfully.
Oct  2 20:41:28.858061 env[1379]: time="2023-10-02T20:41:28.858018663Z" level=info msg="TearDown network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" successfully"
Oct  2 20:41:28.858172 env[1379]: time="2023-10-02T20:41:28.858154255Z" level=info msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" returns successfully"
Oct  2 20:41:28.859472 env[1379]: time="2023-10-02T20:41:28.859441456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nkzvw,Uid:df7d8fb0-7726-4a14-858c-04cbad2f6486,Namespace:calico-system,Attempt:1,}"
Oct  2 20:41:28.914071 kubelet[2468]: I1002 20:41:28.913896    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-fc2vc" podStartSLOduration=30.913848016 podCreationTimestamp="2023-10-02 20:40:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:41:28.892016764 +0000 UTC m=+45.398774857" watchObservedRunningTime="2023-10-02 20:41:28.913848016 +0000 UTC m=+45.420606109"
Oct  2 20:41:28.939326 kubelet[2468]: I1002 20:41:28.939135    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-ln7nz" podStartSLOduration=30.939094897 podCreationTimestamp="2023-10-02 20:40:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:41:28.91912417 +0000 UTC m=+45.425882263" watchObservedRunningTime="2023-10-02 20:41:28.939094897 +0000 UTC m=+45.445852990"
Oct  2 20:41:28.977000 audit[4076]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:28.977000 audit[4076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=fffffb8b8f30 a2=0 a3=ffff815976c0 items=0 ppid=2603 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:28.980000 audit[4076]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:28.980000 audit[4076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=fffffb8b8f30 a2=0 a3=ffff815976c0 items=0 ppid=2603 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:28.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:29.002000 audit[4080]: NETFILTER_CFG table=filter:112 family=2 entries=11 op=nft_register_rule pid=4080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:29.002000 audit[4080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe33e6860 a2=0 a3=ffffb6f096c0 items=0 ppid=2603 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:29.014000 audit[4080]: NETFILTER_CFG table=nat:113 family=2 entries=47 op=nft_register_chain pid=4080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:29.014000 audit[4080]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffe33e6860 a2=0 a3=ffffb6f096c0 items=0 ppid=2603 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:29.109262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 20:41:29.109478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibfe57263898: link becomes ready
Oct  2 20:41:29.126658 systemd-networkd[1509]: calibfe57263898: Link UP
Oct  2 20:41:29.126665 systemd-networkd[1509]: calibfe57263898: Gained carrier
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.001 [INFO][4067] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0 csi-node-driver- calico-system  df7d8fb0-7726-4a14-858c-04cbad2f6486 692 0 2023-10-02 20:41:13 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  csi-node-driver-nkzvw eth0 default [] []   [kns.calico-system ksa.calico-system.default] calibfe57263898  [] []}} ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.001 [INFO][4067] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.056 [INFO][4082] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" HandleID="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.069 [INFO][4082] ipam_plugin.go 269: Auto assigning IP ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" HandleID="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000417fb0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-c505880dad", "pod":"csi-node-driver-nkzvw", "timestamp":"2023-10-02 20:41:29.056596648 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:29.146319 env[1379]: time="2023-10-02T20:41:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:29.146319 env[1379]: time="2023-10-02T20:41:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.069 [INFO][4082] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.072 [INFO][4082] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.076 [INFO][4082] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.079 [INFO][4082] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.081 [INFO][4082] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.083 [INFO][4082] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.083 [INFO][4082] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.085 [INFO][4082] ipam.go 1682: Creating new handle: k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.088 [INFO][4082] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.093 [INFO][4082] ipam.go 1216: Successfully claimed IPs: [192.168.42.68/26] block=192.168.42.64/26 handle="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.093 [INFO][4082] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.68/26] handle="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:29.146319 env[1379]: time="2023-10-02T20:41:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:29.146319 env[1379]: 2023-10-02 20:41:29.093 [INFO][4082] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.68/26] IPv6=[] ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" HandleID="k8s-pod-network.04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.095 [INFO][4067] k8s.go 383: Populated endpoint ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"df7d8fb0-7726-4a14-858c-04cbad2f6486", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"csi-node-driver-nkzvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.42.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibfe57263898", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.096 [INFO][4067] k8s.go 384: Calico CNI using IPs: [192.168.42.68/32] ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.096 [INFO][4067] dataplane_linux.go 68: Setting the host side veth name to calibfe57263898 ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.118 [INFO][4067] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.127 [INFO][4067] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"df7d8fb0-7726-4a14-858c-04cbad2f6486", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a", Pod:"csi-node-driver-nkzvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.42.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibfe57263898", MAC:"9a:5c:aa:e3:35:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:29.147017 env[1379]: 2023-10-02 20:41:29.141 [INFO][4067] k8s.go 489: Wrote updated endpoint to datastore ContainerID="04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a" Namespace="calico-system" Pod="csi-node-driver-nkzvw" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:29.182000 audit[4105]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4105 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:29.182000 audit[4105]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffef707020 a2=0 a3=ffff9a3affa0 items=0 ppid=3424 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.182000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:29.200647 env[1379]: time="2023-10-02T20:41:29.200553159Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:29.200647 env[1379]: time="2023-10-02T20:41:29.200598916Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:29.200647 env[1379]: time="2023-10-02T20:41:29.200610595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:29.201086 env[1379]: time="2023-10-02T20:41:29.201015171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a pid=4112 runtime=io.containerd.runc.v2
Oct  2 20:41:29.227656 systemd[1]: Started cri-containerd-04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a.scope.
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.246000 audit: BPF prog-id=169 op=LOAD
Oct  2 20:41:29.247000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.247000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4112 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633934356630653638353935623432653963353931336662303136
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4112 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633934356630653638353935623432653963353931336662303136
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.248000 audit: BPF prog-id=170 op=LOAD
Oct  2 20:41:29.248000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4112 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633934356630653638353935623432653963353931336662303136
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.249000 audit: BPF prog-id=171 op=LOAD
Oct  2 20:41:29.249000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4112 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633934356630653638353935623432653963353931336662303136
Oct  2 20:41:29.250000 audit: BPF prog-id=171 op=UNLOAD
Oct  2 20:41:29.250000 audit: BPF prog-id=170 op=UNLOAD
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { perfmon } for  pid=4122 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit[4122]: AVC avc:  denied  { bpf } for  pid=4122 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.250000 audit: BPF prog-id=172 op=LOAD
Oct  2 20:41:29.250000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4112 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633934356630653638353935623432653963353931336662303136
Oct  2 20:41:29.283200 env[1379]: time="2023-10-02T20:41:29.283151327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nkzvw,Uid:df7d8fb0-7726-4a14-858c-04cbad2f6486,Namespace:calico-system,Attempt:1,} returns sandbox id \"04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a\""
Oct  2 20:41:29.411529 systemd-networkd[1509]: cali7ee15e8ee8d: Gained IPv6LL
Oct  2 20:41:29.441868 env[1379]: time="2023-10-02T20:41:29.441819302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:29.456646 env[1379]: time="2023-10-02T20:41:29.456590482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:29.462960 env[1379]: time="2023-10-02T20:41:29.462920777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:29.470143 env[1379]: time="2023-10-02T20:41:29.470096139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 20:41:29.470751 env[1379]: time="2023-10-02T20:41:29.470717142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\""
Oct  2 20:41:29.472028 env[1379]: time="2023-10-02T20:41:29.471987944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 20:41:29.473206 env[1379]: time="2023-10-02T20:41:29.473169112Z" level=info msg="CreateContainer within sandbox \"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Oct  2 20:41:29.529851 env[1379]: time="2023-10-02T20:41:29.529800023Z" level=info msg="CreateContainer within sandbox \"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23\""
Oct  2 20:41:29.530671 env[1379]: time="2023-10-02T20:41:29.530632852Z" level=info msg="StartContainer for \"66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23\""
Oct  2 20:41:29.554004 systemd[1]: Started cri-containerd-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23.scope.
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.572000 audit: BPF prog-id=173 op=LOAD
Oct  2 20:41:29.573000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.573000 audit[4158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3731 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363332643463333566613663353830613830346436373231343832
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3731 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363332643463333566613663353830613830346436373231343832
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.574000 audit: BPF prog-id=174 op=LOAD
Oct  2 20:41:29.574000 audit[4158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3731 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363332643463333566613663353830613830346436373231343832
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.575000 audit: BPF prog-id=175 op=LOAD
Oct  2 20:41:29.575000 audit[4158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3731 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363332643463333566613663353830613830346436373231343832
Oct  2 20:41:29.575000 audit: BPF prog-id=175 op=UNLOAD
Oct  2 20:41:29.575000 audit: BPF prog-id=174 op=UNLOAD
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { perfmon } for  pid=4158 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit[4158]: AVC avc:  denied  { bpf } for  pid=4158 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:29.576000 audit: BPF prog-id=176 op=LOAD
Oct  2 20:41:29.576000 audit[4158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3731 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:29.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363332643463333566613663353830613830346436373231343832
Oct  2 20:41:29.598934 env[1379]: time="2023-10-02T20:41:29.598879175Z" level=info msg="StartContainer for \"66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23\" returns successfully"
Oct  2 20:41:29.654381 env[1379]: time="2023-10-02T20:41:29.654300759Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:29.660587 env[1379]: time="2023-10-02T20:41:29.660531659Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:29.660925 kubelet[2468]: E1002 20:41:29.660883    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:41:29.660994 kubelet[2468]: E1002 20:41:29.660942    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:41:29.661415 kubelet[2468]: E1002 20:41:29.661376    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:29.662430 env[1379]: time="2023-10-02T20:41:29.662337549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 20:41:29.829064 env[1379]: time="2023-10-02T20:41:29.828997357Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:29.859480 systemd-networkd[1509]: calidf269ed7bb0: Gained IPv6LL
Oct  2 20:41:29.868651 env[1379]: time="2023-10-02T20:41:29.868569746Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:29.869006 kubelet[2468]: E1002 20:41:29.868856    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:41:29.869006 kubelet[2468]: E1002 20:41:29.868905    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:41:29.869006 kubelet[2468]: E1002 20:41:29.869000    2468 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:29.869171 kubelet[2468]: E1002 20:41:29.869065    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:29.895853 kubelet[2468]: E1002 20:41:29.895769    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:29.919345 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.kAiG5E.mount: Deactivated successfully.
Oct  2 20:41:29.933051 kubelet[2468]: I1002 20:41:29.930736    2468 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-f7qmn" podStartSLOduration=23.704863547 podCreationTimestamp="2023-10-02 20:41:04 +0000 UTC" firstStartedPulling="2023-10-02 20:41:27.245621002 +0000 UTC m=+43.752379095" lastFinishedPulling="2023-10-02 20:41:29.471453937 +0000 UTC m=+45.978212030" observedRunningTime="2023-10-02 20:41:29.904837297 +0000 UTC m=+46.411595390" watchObservedRunningTime="2023-10-02 20:41:29.930696482 +0000 UTC m=+46.437454575"
Oct  2 20:41:30.499501 systemd-networkd[1509]: calibfe57263898: Gained IPv6LL
Oct  2 20:41:30.897391 kubelet[2468]: E1002 20:41:30.897344    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:32.997604 kubelet[2468]: I1002 20:41:32.997553    2468 topology_manager.go:215] "Topology Admit Handler" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b" podNamespace="calico-apiserver" podName="calico-apiserver-5f4f668697-5q6ks"
Oct  2 20:41:33.003462 systemd[1]: Created slice kubepods-besteffort-pod36eccf69_43e4_4a46_8f84_a3969c49056b.slice.
Oct  2 20:41:33.010854 kubelet[2468]: W1002 20:41:33.010824    2468 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-c505880dad" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-c505880dad' and this object
Oct  2 20:41:33.011028 kubelet[2468]: E1002 20:41:33.011015    2468 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-c505880dad" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-c505880dad' and this object
Oct  2 20:41:33.011110 kubelet[2468]: W1002 20:41:33.010844    2468 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.0-a-c505880dad" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-c505880dad' and this object
Oct  2 20:41:33.011180 kubelet[2468]: E1002 20:41:33.011170    2468 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.0-a-c505880dad" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-c505880dad' and this object
Oct  2 20:41:33.027871 kubelet[2468]: I1002 20:41:33.027828    2468 topology_manager.go:215] "Topology Admit Handler" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121" podNamespace="calico-apiserver" podName="calico-apiserver-5f4f668697-scf82"
Oct  2 20:41:33.033313 systemd[1]: Created slice kubepods-besteffort-pod307cdb1f_a25f_4ef5_8f7d_e773fa4aa121.slice.
Oct  2 20:41:33.055000 audit[4211]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.061771 kernel: kauditd_printk_skb: 413 callbacks suppressed
Oct  2 20:41:33.061870 kernel: audit: type=1325 audit(1696279293.055:1284): table=filter:115 family=2 entries=9 op=nft_register_rule pid=4211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.055000 audit[4211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffde750d70 a2=0 a3=ffffa0e256c0 items=0 ppid=2603 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.104207 kernel: audit: type=1300 audit(1696279293.055:1284): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffde750d70 a2=0 a3=ffffa0e256c0 items=0 ppid=2603 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.104512 kubelet[2468]: I1002 20:41:33.104475    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrr2z\" (UniqueName: \"kubernetes.io/projected/307cdb1f-a25f-4ef5-8f7d-e773fa4aa121-kube-api-access-zrr2z\") pod \"calico-apiserver-5f4f668697-scf82\" (UID: \"307cdb1f-a25f-4ef5-8f7d-e773fa4aa121\") " pod="calico-apiserver/calico-apiserver-5f4f668697-scf82"
Oct  2 20:41:33.104617 kubelet[2468]: I1002 20:41:33.104525    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/307cdb1f-a25f-4ef5-8f7d-e773fa4aa121-calico-apiserver-certs\") pod \"calico-apiserver-5f4f668697-scf82\" (UID: \"307cdb1f-a25f-4ef5-8f7d-e773fa4aa121\") " pod="calico-apiserver/calico-apiserver-5f4f668697-scf82"
Oct  2 20:41:33.104617 kubelet[2468]: I1002 20:41:33.104550    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/36eccf69-43e4-4a46-8f84-a3969c49056b-calico-apiserver-certs\") pod \"calico-apiserver-5f4f668697-5q6ks\" (UID: \"36eccf69-43e4-4a46-8f84-a3969c49056b\") " pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks"
Oct  2 20:41:33.104617 kubelet[2468]: I1002 20:41:33.104574    2468 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5kd6b\" (UniqueName: \"kubernetes.io/projected/36eccf69-43e4-4a46-8f84-a3969c49056b-kube-api-access-5kd6b\") pod \"calico-apiserver-5f4f668697-5q6ks\" (UID: \"36eccf69-43e4-4a46-8f84-a3969c49056b\") " pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks"
Oct  2 20:41:33.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.118502 kernel: audit: type=1327 audit(1696279293.055:1284): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.056000 audit[4211]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.132368 kernel: audit: type=1325 audit(1696279293.056:1285): table=nat:116 family=2 entries=20 op=nft_register_rule pid=4211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.132481 kernel: audit: type=1300 audit(1696279293.056:1285): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffde750d70 a2=0 a3=ffffa0e256c0 items=0 ppid=2603 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.056000 audit[4211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffde750d70 a2=0 a3=ffffa0e256c0 items=0 ppid=2603 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.180100 kernel: audit: type=1327 audit(1696279293.056:1285): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.119000 audit[4213]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.194543 kernel: audit: type=1325 audit(1696279293.119:1286): table=filter:117 family=2 entries=10 op=nft_register_rule pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.119000 audit[4213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffca6c5db0 a2=0 a3=ffffa49426c0 items=0 ppid=2603 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.222311 kernel: audit: type=1300 audit(1696279293.119:1286): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffca6c5db0 a2=0 a3=ffffa49426c0 items=0 ppid=2603 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.237105 kernel: audit: type=1327 audit(1696279293.119:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:33.133000 audit[4213]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.251230 kernel: audit: type=1325 audit(1696279293.133:1287): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:33.133000 audit[4213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffca6c5db0 a2=0 a3=ffffa49426c0 items=0 ppid=2603 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:33.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:34.118277 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.s6deVz.mount: Deactivated successfully.
Oct  2 20:41:34.238152 kubelet[2468]: E1002 20:41:34.238124    2468 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:34.238542 kubelet[2468]: E1002 20:41:34.238527    2468 projected.go:198] Error preparing data for projected volume kube-api-access-zrr2z for pod calico-apiserver/calico-apiserver-5f4f668697-scf82: failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:34.238687 kubelet[2468]: E1002 20:41:34.238127    2468 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:34.238687 kubelet[2468]: E1002 20:41:34.238686    2468 projected.go:198] Error preparing data for projected volume kube-api-access-5kd6b for pod calico-apiserver/calico-apiserver-5f4f668697-5q6ks: failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:34.238770 kubelet[2468]: E1002 20:41:34.238661    2468 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/307cdb1f-a25f-4ef5-8f7d-e773fa4aa121-kube-api-access-zrr2z podName:307cdb1f-a25f-4ef5-8f7d-e773fa4aa121 nodeName:}" failed. No retries permitted until 2023-10-02 20:41:34.738641648 +0000 UTC m=+51.245399741 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-zrr2z" (UniqueName: "kubernetes.io/projected/307cdb1f-a25f-4ef5-8f7d-e773fa4aa121-kube-api-access-zrr2z") pod "calico-apiserver-5f4f668697-scf82" (UID: "307cdb1f-a25f-4ef5-8f7d-e773fa4aa121") : failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:34.238770 kubelet[2468]: E1002 20:41:34.238730    2468 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/36eccf69-43e4-4a46-8f84-a3969c49056b-kube-api-access-5kd6b podName:36eccf69-43e4-4a46-8f84-a3969c49056b nodeName:}" failed. No retries permitted until 2023-10-02 20:41:34.738717724 +0000 UTC m=+51.245475817 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-5kd6b" (UniqueName: "kubernetes.io/projected/36eccf69-43e4-4a46-8f84-a3969c49056b-kube-api-access-5kd6b") pod "calico-apiserver-5f4f668697-5q6ks" (UID: "36eccf69-43e4-4a46-8f84-a3969c49056b") : failed to sync configmap cache: timed out waiting for the condition
Oct  2 20:41:35.107117 env[1379]: time="2023-10-02T20:41:35.107066042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f4f668697-5q6ks,Uid:36eccf69-43e4-4a46-8f84-a3969c49056b,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 20:41:35.137278 env[1379]: time="2023-10-02T20:41:35.137231420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f4f668697-scf82,Uid:307cdb1f-a25f-4ef5-8f7d-e773fa4aa121,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 20:41:35.331683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 20:41:35.331791 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic92f69052c4: link becomes ready
Oct  2 20:41:35.340761 systemd-networkd[1509]: calic92f69052c4: Link UP
Oct  2 20:41:35.340768 systemd-networkd[1509]: calic92f69052c4: Gained carrier
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.213 [INFO][4262] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0 calico-apiserver-5f4f668697- calico-apiserver  36eccf69-43e4-4a46-8f84-a3969c49056b 787 0 2023-10-02 20:41:32 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f4f668697 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  calico-apiserver-5f4f668697-5q6ks eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic92f69052c4  [] []}} ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.214 [INFO][4262] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.279 [INFO][4285] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" HandleID="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.294 [INFO][4285] ipam_plugin.go 269: Auto assigning IP ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" HandleID="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400041df60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-c505880dad", "pod":"calico-apiserver-5f4f668697-5q6ks", "timestamp":"2023-10-02 20:41:35.279204449 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:35.360884 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:35.360884 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.294 [INFO][4285] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.295 [INFO][4285] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.299 [INFO][4285] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.302 [INFO][4285] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.303 [INFO][4285] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.305 [INFO][4285] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.305 [INFO][4285] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.307 [INFO][4285] ipam.go 1682: Creating new handle: k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.310 [INFO][4285] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.316 [INFO][4285] ipam.go 1216: Successfully claimed IPs: [192.168.42.69/26] block=192.168.42.64/26 handle="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.316 [INFO][4285] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.69/26] handle="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.360884 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:35.360884 env[1379]: 2023-10-02 20:41:35.316 [INFO][4285] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.69/26] IPv6=[] ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" HandleID="k8s-pod-network.0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.318 [INFO][4262] k8s.go 383: Populated endpoint ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0", GenerateName:"calico-apiserver-5f4f668697-", Namespace:"calico-apiserver", SelfLink:"", UID:"36eccf69-43e4-4a46-8f84-a3969c49056b", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f4f668697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"calico-apiserver-5f4f668697-5q6ks", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.42.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic92f69052c4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.318 [INFO][4262] k8s.go 384: Calico CNI using IPs: [192.168.42.69/32] ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.318 [INFO][4262] dataplane_linux.go 68: Setting the host side veth name to calic92f69052c4 ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.333 [INFO][4262] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.341 [INFO][4262] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0", GenerateName:"calico-apiserver-5f4f668697-", Namespace:"calico-apiserver", SelfLink:"", UID:"36eccf69-43e4-4a46-8f84-a3969c49056b", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f4f668697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7", Pod:"calico-apiserver-5f4f668697-5q6ks", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.42.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic92f69052c4", MAC:"86:ff:7d:d9:88:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:35.361452 env[1379]: 2023-10-02 20:41:35.358 [INFO][4262] k8s.go 489: Wrote updated endpoint to datastore ContainerID="0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-5q6ks" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--5q6ks-eth0"
Oct  2 20:41:35.403460 env[1379]: time="2023-10-02T20:41:35.403385843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:35.403652 env[1379]: time="2023-10-02T20:41:35.403628829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:35.403736 env[1379]: time="2023-10-02T20:41:35.403715504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:35.407412 env[1379]: time="2023-10-02T20:41:35.404255073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7 pid=4317 runtime=io.containerd.runc.v2
Oct  2 20:41:35.419250 systemd-networkd[1509]: califfc9dc6b8f7: Link UP
Oct  2 20:41:35.419257 systemd-networkd[1509]: califfc9dc6b8f7: Gained carrier
Oct  2 20:41:35.435742 systemd[1]: Started cri-containerd-0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7.scope.
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.266 [INFO][4274] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0 calico-apiserver-5f4f668697- calico-apiserver  307cdb1f-a25f-4ef5-8f7d-e773fa4aa121 790 0 2023-10-02 20:41:32 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f4f668697 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-c505880dad  calico-apiserver-5f4f668697-scf82 eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califfc9dc6b8f7  [] []}} ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.266 [INFO][4274] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.342 [INFO][4290] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" HandleID="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.363 [INFO][4290] ipam_plugin.go 269: Auto assigning IP ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" HandleID="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000102710), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-c505880dad", "pod":"calico-apiserver-5f4f668697-scf82", "timestamp":"2023-10-02 20:41:35.342534036 +0000 UTC"}, Hostname:"ci-3510.3.0-a-c505880dad", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 20:41:35.451965 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:35.451965 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.363 [INFO][4290] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-c505880dad'
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.368 [INFO][4290] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.378 [INFO][4290] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.384 [INFO][4290] ipam.go 489: Trying affinity for 192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.387 [INFO][4290] ipam.go 155: Attempting to load block cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.389 [INFO][4290] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.42.64/26 host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.389 [INFO][4290] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.42.64/26 handle="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.390 [INFO][4290] ipam.go 1682: Creating new handle: k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.396 [INFO][4290] ipam.go 1203: Writing block in order to claim IPs block=192.168.42.64/26 handle="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.407 [INFO][4290] ipam.go 1216: Successfully claimed IPs: [192.168.42.70/26] block=192.168.42.64/26 handle="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.407 [INFO][4290] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.42.70/26] handle="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" host="ci-3510.3.0-a-c505880dad"
Oct  2 20:41:35.451965 env[1379]: time="2023-10-02T20:41:35Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:35.451965 env[1379]: 2023-10-02 20:41:35.408 [INFO][4290] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.42.70/26] IPv6=[] ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" HandleID="k8s-pod-network.f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.409 [INFO][4274] k8s.go 383: Populated endpoint ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0", GenerateName:"calico-apiserver-5f4f668697-", Namespace:"calico-apiserver", SelfLink:"", UID:"307cdb1f-a25f-4ef5-8f7d-e773fa4aa121", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f4f668697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"", Pod:"calico-apiserver-5f4f668697-scf82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.42.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfc9dc6b8f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.409 [INFO][4274] k8s.go 384: Calico CNI using IPs: [192.168.42.70/32] ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.409 [INFO][4274] dataplane_linux.go 68: Setting the host side veth name to califfc9dc6b8f7 ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.410 [INFO][4274] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.420 [INFO][4274] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0", GenerateName:"calico-apiserver-5f4f668697-", Namespace:"calico-apiserver", SelfLink:"", UID:"307cdb1f-a25f-4ef5-8f7d-e773fa4aa121", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f4f668697", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3", Pod:"calico-apiserver-5f4f668697-scf82", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.42.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfc9dc6b8f7", MAC:"22:74:d0:22:6c:1c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:35.452583 env[1379]: 2023-10-02 20:41:35.443 [INFO][4274] k8s.go 489: Wrote updated endpoint to datastore ContainerID="f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3" Namespace="calico-apiserver" Pod="calico-apiserver-5f4f668697-scf82" WorkloadEndpoint="ci--3510.3.0--a--c505880dad-k8s-calico--apiserver--5f4f668697--scf82-eth0"
Oct  2 20:41:35.464000 audit[4341]: NETFILTER_CFG table=filter:119 family=2 entries=59 op=nft_register_chain pid=4341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:35.464000 audit[4341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd90c2a20 a2=0 a3=ffff9583efa0 items=0 ppid=3424 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.464000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:35.479962 env[1379]: time="2023-10-02T20:41:35.479648619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 20:41:35.479962 env[1379]: time="2023-10-02T20:41:35.479689137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 20:41:35.479962 env[1379]: time="2023-10-02T20:41:35.479699177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 20:41:35.480240 env[1379]: time="2023-10-02T20:41:35.480170750Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3 pid=4365 runtime=io.containerd.runc.v2
Oct  2 20:41:35.497016 systemd[1]: Started cri-containerd-f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3.scope.
Oct  2 20:41:35.497000 audit[4378]: NETFILTER_CFG table=filter:120 family=2 entries=50 op=nft_register_chain pid=4378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 20:41:35.497000 audit[4378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffcee36350 a2=0 a3=ffffb340ffa0 items=0 ppid=3424 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.499000 audit: BPF prog-id=177 op=LOAD
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4317 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383763643062303837393531636332386537313962653234323035
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4317 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383763643062303837393531636332386537313962653234323035
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.500000 audit: BPF prog-id=178 op=LOAD
Oct  2 20:41:35.500000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4317 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383763643062303837393531636332386537313962653234323035
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.501000 audit: BPF prog-id=179 op=LOAD
Oct  2 20:41:35.501000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4317 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383763643062303837393531636332386537313962653234323035
Oct  2 20:41:35.502000 audit: BPF prog-id=179 op=UNLOAD
Oct  2 20:41:35.502000 audit: BPF prog-id=178 op=UNLOAD
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { perfmon } for  pid=4331 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit[4331]: AVC avc:  denied  { bpf } for  pid=4331 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.502000 audit: BPF prog-id=180 op=LOAD
Oct  2 20:41:35.502000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4317 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038383763643062303837393531636332386537313962653234323035
Oct  2 20:41:35.536502 env[1379]: time="2023-10-02T20:41:35.536454134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f4f668697-5q6ks,Uid:36eccf69-43e4-4a46-8f84-a3969c49056b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"0887cd0b087951cc28e719be24205fff774b864568cfc67e010eafc5f030e9e7\""
Oct  2 20:41:35.538422 env[1379]: time="2023-10-02T20:41:35.538389985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.545000 audit: BPF prog-id=181 op=LOAD
Oct  2 20:41:35.546000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.546000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4365 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635333662333963393633653434656237663531636231316631656639
Oct  2 20:41:35.546000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.546000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4365 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635333662333963393633653434656237663531636231316631656639
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit: BPF prog-id=182 op=LOAD
Oct  2 20:41:35.547000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4365 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635333662333963393633653434656237663531636231316631656639
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.547000 audit: BPF prog-id=183 op=LOAD
Oct  2 20:41:35.547000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4365 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635333662333963393633653434656237663531636231316631656639
Oct  2 20:41:35.548000 audit: BPF prog-id=183 op=UNLOAD
Oct  2 20:41:35.548000 audit: BPF prog-id=182 op=UNLOAD
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { perfmon } for  pid=4373 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit[4373]: AVC avc:  denied  { bpf } for  pid=4373 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:41:35.548000 audit: BPF prog-id=184 op=LOAD
Oct  2 20:41:35.548000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4365 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635333662333963393633653434656237663531636231316631656639
Oct  2 20:41:35.576621 env[1379]: time="2023-10-02T20:41:35.576575991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f4f668697-scf82,Uid:307cdb1f-a25f-4ef5-8f7d-e773fa4aa121,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f536b39c963e44eb7f51cb11f1ef9fb3bb43589cc3bd10d8b6e4b496edf7cfd3\""
Oct  2 20:41:35.718437 env[1379]: time="2023-10-02T20:41:35.717517118Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:35.722680 env[1379]: time="2023-10-02T20:41:35.722639749Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:35.723231 kubelet[2468]: E1002 20:41:35.723013    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:35.723231 kubelet[2468]: E1002 20:41:35.723065    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:35.723605 kubelet[2468]: E1002 20:41:35.723272    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5kd6b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-5q6ks_calico-apiserver(36eccf69-43e4-4a46-8f84-a3969c49056b): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:35.723605 kubelet[2468]: E1002 20:41:35.723319    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:41:35.723801 env[1379]: time="2023-10-02T20:41:35.723763246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:41:35.872818 env[1379]: time="2023-10-02T20:41:35.872722601Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:35.878113 env[1379]: time="2023-10-02T20:41:35.878057980Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:35.878356 kubelet[2468]: E1002 20:41:35.878329    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:35.878425 kubelet[2468]: E1002 20:41:35.878394    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:35.878513 kubelet[2468]: E1002 20:41:35.878489    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-zrr2z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-scf82_calico-apiserver(307cdb1f-a25f-4ef5-8f7d-e773fa4aa121): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:35.878625 kubelet[2468]: E1002 20:41:35.878538    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:41:35.906097 kubelet[2468]: E1002 20:41:35.905896    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:41:35.908728 kubelet[2468]: E1002 20:41:35.908700    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:41:35.936000 audit[4408]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:35.936000 audit[4408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff3196080 a2=0 a3=ffffb8db36c0 items=0 ppid=2603 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:35.938000 audit[4408]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:35.938000 audit[4408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=fffff3196080 a2=0 a3=ffffb8db36c0 items=0 ppid=2603 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:35.951000 audit[4410]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:35.951000 audit[4410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc49120d0 a2=0 a3=ffff85ad36c0 items=0 ppid=2603 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:35.952000 audit[4410]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 20:41:35.952000 audit[4410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc49120d0 a2=0 a3=ffff85ad36c0 items=0 ppid=2603 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:41:35.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 20:41:36.771510 systemd-networkd[1509]: califfc9dc6b8f7: Gained IPv6LL
Oct  2 20:41:36.911220 kubelet[2468]: E1002 20:41:36.911192    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:41:36.912061 kubelet[2468]: E1002 20:41:36.912017    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:41:37.091574 systemd-networkd[1509]: calic92f69052c4: Gained IPv6LL
Oct  2 20:41:40.012000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.018759 kernel: kauditd_printk_skb: 134 callbacks suppressed
Oct  2 20:41:40.018845 kernel: audit: type=1400 audit(1696279300.012:1330): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.012000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4005cfc510 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.069478 kernel: audit: type=1300 audit(1696279300.012:1330): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4005cfc510 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.094185 kernel: audit: type=1327 audit(1696279300.012:1330): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.012000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.116029 kernel: audit: type=1400 audit(1696279300.012:1331): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.012000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=400d0695e0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.143453 kernel: audit: type=1300 audit(1696279300.012:1331): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=400d0695e0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.012000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.168792 kernel: audit: type=1327 audit(1696279300.012:1331): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.013000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.191778 kernel: audit: type=1400 audit(1696279300.013:1332): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.013000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4007645f80 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.220331 kernel: audit: type=1300 audit(1696279300.013:1332): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4007645f80 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.245106 kernel: audit: type=1327 audit(1696279300.013:1332): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.064000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.268420 kernel: audit: type=1400 audit(1696279300.064:1333): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.064000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40078103f0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.064000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.260000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.260000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4007810930 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:40.260000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:40.260000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=4009470800 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:41:40.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:41:41.058000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:41.058000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:41.058000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001641b00 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:41.058000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254f5c0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:41.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:41.058000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:43.669154 env[1379]: time="2023-10-02T20:41:43.668835686Z" level=info msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\""
Oct  2 20:41:43.688549 env[1379]: time="2023-10-02T20:41:43.688501191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.734 [WARNING][4439] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8", Pod:"calico-kube-controllers-74b9887bb6-f7qmn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.42.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17c95d30659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.735 [INFO][4439] k8s.go 576: Cleaning up netns ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.735 [INFO][4439] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" iface="eth0" netns=""
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.735 [INFO][4439] k8s.go 583: Releasing IP address(es) ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.735 [INFO][4439] utils.go 196: Calico CNI releasing IP address ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.765 [INFO][4447] ipam_plugin.go 416: Releasing address using handleID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.782019 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:43.782019 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.776 [WARNING][4447] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.776 [INFO][4447] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.782019 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:43.782019 env[1379]: 2023-10-02 20:41:43.780 [INFO][4439] k8s.go 589: Teardown processing complete. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.782484 env[1379]: time="2023-10-02T20:41:43.782052082Z" level=info msg="TearDown network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" successfully"
Oct  2 20:41:43.782484 env[1379]: time="2023-10-02T20:41:43.782079960Z" level=info msg="StopPodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" returns successfully"
Oct  2 20:41:43.783093 env[1379]: time="2023-10-02T20:41:43.783058710Z" level=info msg="RemovePodSandbox for \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\""
Oct  2 20:41:43.783145 env[1379]: time="2023-10-02T20:41:43.783097028Z" level=info msg="Forcibly stopping sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\""
Oct  2 20:41:43.845018 env[1379]: time="2023-10-02T20:41:43.844956275Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:43.848078 env[1379]: time="2023-10-02T20:41:43.848027716Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:43.850160 kubelet[2468]: E1002 20:41:43.848300    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:41:43.850160 kubelet[2468]: E1002 20:41:43.848353    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:41:43.850160 kubelet[2468]: E1002 20:41:43.848494    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:43.850689 env[1379]: time="2023-10-02T20:41:43.849616274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.830 [WARNING][4465] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"ec53cbea-214c-4e27-8cd8-8227d8c2f7ec", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"a66794541a88fe4fbcc8d265d3d5947417f64d14c829b3cd6fe082b84f8605b8", Pod:"calico-kube-controllers-74b9887bb6-f7qmn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.42.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17c95d30659", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.830 [INFO][4465] k8s.go 576: Cleaning up netns ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.830 [INFO][4465] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" iface="eth0" netns=""
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.830 [INFO][4465] k8s.go 583: Releasing IP address(es) ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.830 [INFO][4465] utils.go 196: Calico CNI releasing IP address ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.880 [INFO][4471] ipam_plugin.go 416: Releasing address using handleID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.896297 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:43.896297 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.891 [WARNING][4471] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.891 [INFO][4471] ipam_plugin.go 444: Releasing address using workloadID ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" HandleID="k8s-pod-network.3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90" Workload="ci--3510.3.0--a--c505880dad-k8s-calico--kube--controllers--74b9887bb6--f7qmn-eth0"
Oct  2 20:41:43.896297 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:43.896297 env[1379]: 2023-10-02 20:41:43.894 [INFO][4465] k8s.go 589: Teardown processing complete. ContainerID="3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90"
Oct  2 20:41:43.896734 env[1379]: time="2023-10-02T20:41:43.896342062Z" level=info msg="TearDown network for sandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" successfully"
Oct  2 20:41:43.916891 env[1379]: time="2023-10-02T20:41:43.916714930Z" level=info msg="RemovePodSandbox \"3c409aada7c8fa36f42c72874acde689551d818dfce5ff20c7f7e8b5cedd5f90\" returns successfully"
Oct  2 20:41:43.917622 env[1379]: time="2023-10-02T20:41:43.917589805Z" level=info msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\""
Oct  2 20:41:43.995258 env[1379]: time="2023-10-02T20:41:43.995137482Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:44.002067 env[1379]: time="2023-10-02T20:41:43.999806721Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:44.002825 kubelet[2468]: E1002 20:41:44.002322    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:41:44.002825 kubelet[2468]: E1002 20:41:44.002379    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:41:44.002825 kubelet[2468]: E1002 20:41:44.002464    2468 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:44.002825 kubelet[2468]: E1002 20:41:44.002512    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.965 [WARNING][4490] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6981657c-eddf-4bb1-9959-fd0361528968", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719", Pod:"coredns-5dd5756b68-fc2vc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ee15e8ee8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.966 [INFO][4490] k8s.go 576: Cleaning up netns ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.966 [INFO][4490] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" iface="eth0" netns=""
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.966 [INFO][4490] k8s.go 583: Releasing IP address(es) ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.966 [INFO][4490] utils.go 196: Calico CNI releasing IP address ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:43.993 [INFO][4497] ipam_plugin.go 416: Releasing address using handleID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.012211 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.012211 env[1379]: time="2023-10-02T20:41:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:44.006 [WARNING][4497] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:44.006 [INFO][4497] ipam_plugin.go 444: Releasing address using workloadID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.012211 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.012211 env[1379]: 2023-10-02 20:41:44.011 [INFO][4490] k8s.go 589: Teardown processing complete. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.012695 env[1379]: time="2023-10-02T20:41:44.012663143Z" level=info msg="TearDown network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" successfully"
Oct  2 20:41:44.012763 env[1379]: time="2023-10-02T20:41:44.012747459Z" level=info msg="StopPodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" returns successfully"
Oct  2 20:41:44.013274 env[1379]: time="2023-10-02T20:41:44.013228794Z" level=info msg="RemovePodSandbox for \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\""
Oct  2 20:41:44.013348 env[1379]: time="2023-10-02T20:41:44.013273272Z" level=info msg="Forcibly stopping sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\""
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.060 [WARNING][4515] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"6981657c-eddf-4bb1-9959-fd0361528968", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"54c44b3c84e111da03e8613074bd77125d39db3e08dc475b34b4ae83d41df719", Pod:"coredns-5dd5756b68-fc2vc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ee15e8ee8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.060 [INFO][4515] k8s.go 576: Cleaning up netns ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.060 [INFO][4515] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" iface="eth0" netns=""
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.061 [INFO][4515] k8s.go 583: Releasing IP address(es) ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.061 [INFO][4515] utils.go 196: Calico CNI releasing IP address ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.087 [INFO][4522] ipam_plugin.go 416: Releasing address using handleID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.103992 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.103992 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.100 [WARNING][4522] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.100 [INFO][4522] ipam_plugin.go 444: Releasing address using workloadID ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" HandleID="k8s-pod-network.80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--fc2vc-eth0"
Oct  2 20:41:44.103992 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.103992 env[1379]: 2023-10-02 20:41:44.102 [INFO][4515] k8s.go 589: Teardown processing complete. ContainerID="80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9"
Oct  2 20:41:44.104690 env[1379]: time="2023-10-02T20:41:44.104644163Z" level=info msg="TearDown network for sandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" successfully"
Oct  2 20:41:44.120082 env[1379]: time="2023-10-02T20:41:44.120037416Z" level=info msg="RemovePodSandbox \"80a2b5717af017ab56bc8db79f88ae1aa0ca9a242681e43bc60730e0dc67cbe9\" returns successfully"
Oct  2 20:41:44.120702 env[1379]: time="2023-10-02T20:41:44.120669304Z" level=info msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\""
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.194 [WARNING][4562] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"94088da4-a637-4a4f-8d7a-846ff32d11fa", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed", Pod:"coredns-5dd5756b68-ln7nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf269ed7bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.194 [INFO][4562] k8s.go 576: Cleaning up netns ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.194 [INFO][4562] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" iface="eth0" netns=""
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.195 [INFO][4562] k8s.go 583: Releasing IP address(es) ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.195 [INFO][4562] utils.go 196: Calico CNI releasing IP address ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.223 [INFO][4591] ipam_plugin.go 416: Releasing address using handleID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.237035 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.237035 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.233 [WARNING][4591] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.233 [INFO][4591] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.237035 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.237035 env[1379]: 2023-10-02 20:41:44.235 [INFO][4562] k8s.go 589: Teardown processing complete. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.237582 env[1379]: time="2023-10-02T20:41:44.237545771Z" level=info msg="TearDown network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" successfully"
Oct  2 20:41:44.237643 env[1379]: time="2023-10-02T20:41:44.237627447Z" level=info msg="StopPodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" returns successfully"
Oct  2 20:41:44.238341 env[1379]: time="2023-10-02T20:41:44.238296852Z" level=info msg="RemovePodSandbox for \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\""
Oct  2 20:41:44.238476 env[1379]: time="2023-10-02T20:41:44.238423406Z" level=info msg="Forcibly stopping sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\""
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.289 [WARNING][4610] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"94088da4-a637-4a4f-8d7a-846ff32d11fa", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 40, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"4f1b3da174543bd60ae116dc999ef9b3e666789e349207421af11e41924347ed", Pod:"coredns-5dd5756b68-ln7nz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.42.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf269ed7bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.290 [INFO][4610] k8s.go 576: Cleaning up netns ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.290 [INFO][4610] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" iface="eth0" netns=""
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.290 [INFO][4610] k8s.go 583: Releasing IP address(es) ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.290 [INFO][4610] utils.go 196: Calico CNI releasing IP address ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.320 [INFO][4616] ipam_plugin.go 416: Releasing address using handleID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.333777 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.333777 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.330 [WARNING][4616] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.330 [INFO][4616] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" HandleID="k8s-pod-network.e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a" Workload="ci--3510.3.0--a--c505880dad-k8s-coredns--5dd5756b68--ln7nz-eth0"
Oct  2 20:41:44.333777 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.333777 env[1379]: 2023-10-02 20:41:44.332 [INFO][4610] k8s.go 589: Teardown processing complete. ContainerID="e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a"
Oct  2 20:41:44.334220 env[1379]: time="2023-10-02T20:41:44.333798852Z" level=info msg="TearDown network for sandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" successfully"
Oct  2 20:41:44.343488 env[1379]: time="2023-10-02T20:41:44.343435160Z" level=info msg="RemovePodSandbox \"e2b50cc2bd19a8b6ba47e13861ff8a265ca87fe6624566e6dc7d2e1d26f1bc4a\" returns successfully"
Oct  2 20:41:44.343988 env[1379]: time="2023-10-02T20:41:44.343955653Z" level=info msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\""
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.393 [WARNING][4634] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"df7d8fb0-7726-4a14-858c-04cbad2f6486", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a", Pod:"csi-node-driver-nkzvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.42.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibfe57263898", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.393 [INFO][4634] k8s.go 576: Cleaning up netns ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.393 [INFO][4634] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" iface="eth0" netns=""
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.393 [INFO][4634] k8s.go 583: Releasing IP address(es) ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.393 [INFO][4634] utils.go 196: Calico CNI releasing IP address ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.422 [INFO][4641] ipam_plugin.go 416: Releasing address using handleID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.439087 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.439087 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.434 [WARNING][4641] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.434 [INFO][4641] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.439087 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.439087 env[1379]: 2023-10-02 20:41:44.437 [INFO][4634] k8s.go 589: Teardown processing complete. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.439087 env[1379]: time="2023-10-02T20:41:44.438935719Z" level=info msg="TearDown network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" successfully"
Oct  2 20:41:44.439087 env[1379]: time="2023-10-02T20:41:44.438967758Z" level=info msg="StopPodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" returns successfully"
Oct  2 20:41:44.439849 env[1379]: time="2023-10-02T20:41:44.439810715Z" level=info msg="RemovePodSandbox for \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\""
Oct  2 20:41:44.439897 env[1379]: time="2023-10-02T20:41:44.439847153Z" level=info msg="Forcibly stopping sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\""
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.490 [WARNING][4660] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"df7d8fb0-7726-4a14-858c-04cbad2f6486", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 41, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-c505880dad", ContainerID:"04c945f0e68595b42e9c5913fb016e8e7704333f557c13465d8a8bbea283c91a", Pod:"csi-node-driver-nkzvw", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.42.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibfe57263898", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.490 [INFO][4660] k8s.go 576: Cleaning up netns ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.490 [INFO][4660] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" iface="eth0" netns=""
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.491 [INFO][4660] k8s.go 583: Releasing IP address(es) ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.491 [INFO][4660] utils.go 196: Calico CNI releasing IP address ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.532 [INFO][4667] ipam_plugin.go 416: Releasing address using handleID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.545572 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 20:41:44.545572 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.542 [WARNING][4667] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.542 [INFO][4667] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" HandleID="k8s-pod-network.b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c" Workload="ci--3510.3.0--a--c505880dad-k8s-csi--node--driver--nkzvw-eth0"
Oct  2 20:41:44.545572 env[1379]: time="2023-10-02T20:41:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 20:41:44.545572 env[1379]: 2023-10-02 20:41:44.544 [INFO][4660] k8s.go 589: Teardown processing complete. ContainerID="b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c"
Oct  2 20:41:44.545998 env[1379]: time="2023-10-02T20:41:44.545578269Z" level=info msg="TearDown network for sandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" successfully"
Oct  2 20:41:44.558726 env[1379]: time="2023-10-02T20:41:44.558670120Z" level=info msg="RemovePodSandbox \"b1798b538ec029bb193a361a56a9194f8e4c6646f28b304706f8f190eb84961c\" returns successfully"
Oct  2 20:41:45.078000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.084261 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 20:41:45.084387 kernel: audit: type=1400 audit(1696279305.078:1338): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.078000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cae0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.137668 kernel: audit: type=1300 audit(1696279305.078:1338): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cae0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.137795 kernel: audit: type=1327 audit(1696279305.078:1338): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.082000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.186320 kernel: audit: type=1400 audit(1696279305.082:1339): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.186450 kernel: audit: type=1300 audit(1696279305.082:1339): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cc00 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.082000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cc00 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.244266 kernel: audit: type=1327 audit(1696279305.082:1339): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.083000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.267205 kernel: audit: type=1400 audit(1696279305.083:1340): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.083000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cc20 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.297381 kernel: audit: type=1300 audit(1696279305.083:1340): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400254cc20 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.322646 kernel: audit: type=1327 audit(1696279305.083:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:45.084000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.347513 kernel: audit: type=1400 audit(1696279305.084:1341): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:41:45.084000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029b68c0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:41:45.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:41:50.687792 env[1379]: time="2023-10-02T20:41:50.687723336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:41:50.877702 env[1379]: time="2023-10-02T20:41:50.877470929Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:50.881050 env[1379]: time="2023-10-02T20:41:50.880940001Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:50.881246 kubelet[2468]: E1002 20:41:50.881208    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:50.881558 kubelet[2468]: E1002 20:41:50.881256    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:50.881558 kubelet[2468]: E1002 20:41:50.881382    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5kd6b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-5q6ks_calico-apiserver(36eccf69-43e4-4a46-8f84-a3969c49056b): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:50.881558 kubelet[2468]: E1002 20:41:50.881426    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:41:51.688210 env[1379]: time="2023-10-02T20:41:51.687990495Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:41:51.849986 env[1379]: time="2023-10-02T20:41:51.849910420Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:41:51.853154 env[1379]: time="2023-10-02T20:41:51.853111986Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:41:51.853397 kubelet[2468]: E1002 20:41:51.853377    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:51.853530 kubelet[2468]: E1002 20:41:51.853520    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:41:51.853725 kubelet[2468]: E1002 20:41:51.853712    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-zrr2z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-scf82_calico-apiserver(307cdb1f-a25f-4ef5-8f7d-e773fa4aa121): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:41:51.854296 kubelet[2468]: E1002 20:41:51.854264    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:41:54.120135 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.ywV2za.mount: Deactivated successfully.
Oct  2 20:41:58.687439 kubelet[2468]: E1002 20:41:58.687393    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:42:04.120099 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.lqqhTr.mount: Deactivated successfully.
Oct  2 20:42:04.700300 kubelet[2468]: E1002 20:42:04.698577    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:42:05.112051 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.dYQ5tr.mount: Deactivated successfully.
Oct  2 20:42:05.689260 kubelet[2468]: E1002 20:42:05.689223    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:42:11.688014 env[1379]: time="2023-10-02T20:42:11.687928693Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 20:42:11.853851 env[1379]: time="2023-10-02T20:42:11.853773234Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:11.858288 env[1379]: time="2023-10-02T20:42:11.858227367Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:11.858583 kubelet[2468]: E1002 20:42:11.858555    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:42:11.858869 kubelet[2468]: E1002 20:42:11.858605    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:42:11.858869 kubelet[2468]: E1002 20:42:11.858709    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:11.859963 env[1379]: time="2023-10-02T20:42:11.859918137Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 20:42:12.016937 env[1379]: time="2023-10-02T20:42:12.016870533Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:12.022498 env[1379]: time="2023-10-02T20:42:12.022442941Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:12.022705 kubelet[2468]: E1002 20:42:12.022673    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:42:12.022778 kubelet[2468]: E1002 20:42:12.022718    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:42:12.022839 kubelet[2468]: E1002 20:42:12.022819    2468 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:12.022940 kubelet[2468]: E1002 20:42:12.022876    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:42:14.117269 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.v5spC9.mount: Deactivated successfully.
Oct  2 20:42:15.113084 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.SHMreq.mount: Deactivated successfully.
Oct  2 20:42:17.688647 env[1379]: time="2023-10-02T20:42:17.688010674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:42:17.859155 env[1379]: time="2023-10-02T20:42:17.858943924Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:17.866126 env[1379]: time="2023-10-02T20:42:17.866041556Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:17.866478 kubelet[2468]: E1002 20:42:17.866437    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:17.866745 kubelet[2468]: E1002 20:42:17.866494    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:17.867026 kubelet[2468]: E1002 20:42:17.866996    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-zrr2z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-scf82_calico-apiserver(307cdb1f-a25f-4ef5-8f7d-e773fa4aa121): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:17.867142 kubelet[2468]: E1002 20:42:17.867045    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:42:20.687163 env[1379]: time="2023-10-02T20:42:20.686939656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:42:20.862253 env[1379]: time="2023-10-02T20:42:20.859562085Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:20.864207 env[1379]: time="2023-10-02T20:42:20.864162541Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:20.864479 kubelet[2468]: E1002 20:42:20.864456    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:20.864823 kubelet[2468]: E1002 20:42:20.864809    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:20.865012 kubelet[2468]: E1002 20:42:20.864996    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5kd6b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-5q6ks_calico-apiserver(36eccf69-43e4-4a46-8f84-a3969c49056b): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:20.865214 kubelet[2468]: E1002 20:42:20.865200    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:42:24.116816 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.eE1hev.mount: Deactivated successfully.
Oct  2 20:42:24.152002 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.wJgET4.mount: Deactivated successfully.
Oct  2 20:42:26.688011 kubelet[2468]: E1002 20:42:26.687971    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:42:31.949274 update_engine[1368]: I1002 20:42:31.949225  1368 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs
Oct  2 20:42:31.949274 update_engine[1368]: I1002 20:42:31.949267  1368 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs
Oct  2 20:42:31.949707 update_engine[1368]: I1002 20:42:31.949466  1368 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs
Oct  2 20:42:31.949849 update_engine[1368]: I1002 20:42:31.949793  1368 omaha_request_params.cc:62] Current group set to lts
Oct  2 20:42:31.950223 update_engine[1368]: I1002 20:42:31.949921  1368 update_attempter.cc:495] Already updated boot flags. Skipping.
Oct  2 20:42:31.950223 update_engine[1368]: I1002 20:42:31.949932  1368 update_attempter.cc:638] Scheduling an action processor start.
Oct  2 20:42:31.950223 update_engine[1368]: I1002 20:42:31.949947  1368 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction
Oct  2 20:42:31.950223 update_engine[1368]: I1002 20:42:31.949970  1368 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs
Oct  2 20:42:31.950352 locksmithd[1437]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0
Oct  2 20:42:31.956811 update_engine[1368]: I1002 20:42:31.956784  1368 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/
Oct  2 20:42:31.956811 update_engine[1368]: I1002 20:42:31.956802  1368 omaha_request_action.cc:269] Request: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 20:42:31.956811 update_engine[1368]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1">
Oct  2 20:42:31.956811 update_engine[1368]:     <os version="Chateau" platform="CoreOS" sp="3510.3.0_aarch64"></os>
Oct  2 20:42:31.956811 update_engine[1368]:     <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.0" track="lts" bootid="{df9fb949-9574-41d8-a605-29a69d338ca3}" oem="azure" oemversion="2.6.0.2-r1" alephversion="3510.3.0" machineid="2b9c817caf7040a8a5f8d96149dcdaa1" machinealias="" lang="en-US" board="arm64-usr" hardware_class="" delta_okay="false" >
Oct  2 20:42:31.956811 update_engine[1368]:         <ping active="1"></ping>
Oct  2 20:42:31.956811 update_engine[1368]:         <updatecheck></updatecheck>
Oct  2 20:42:31.956811 update_engine[1368]:         <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event>
Oct  2 20:42:31.956811 update_engine[1368]:     </app>
Oct  2 20:42:31.956811 update_engine[1368]: </request>
Oct  2 20:42:31.956811 update_engine[1368]: I1002 20:42:31.956808  1368 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Oct  2 20:42:31.958502 update_engine[1368]: I1002 20:42:31.958479  1368 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS
Oct  2 20:42:31.958703 update_engine[1368]: I1002 20:42:31.958681  1368 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Oct  2 20:42:32.687329 kubelet[2468]: E1002 20:42:32.687299    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:42:33.084810 update_engine[1368]: I1002 20:42:33.084766  1368 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs
Oct  2 20:42:33.085149 update_engine[1368]: I1002 20:42:33.085024  1368 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs
Oct  2 20:42:33.085212 update_engine[1368]: I1002 20:42:33.085189  1368 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs
Oct  2 20:42:33.450340 update_engine[1368]: I1002 20:42:33.450224  1368 libcurl_http_fetcher.cc:263] HTTP response code: 200
Oct  2 20:42:33.451799 update_engine[1368]: I1002 20:42:33.451750  1368 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded
Oct  2 20:42:33.451799 update_engine[1368]: I1002 20:42:33.451783  1368 omaha_request_action.cc:619] Omaha request response: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 20:42:33.451799 update_engine[1368]: <response protocol="3.0" server="nebraska"><daystart elapsed_seconds="0"></daystart><app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" status="ok"><ping status="ok"></ping><updatecheck status="noupdate"><urls></urls></updatecheck><event status="ok"></event></app></response>
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678692  1368 omaha_request_action.cc:409] No update.
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678737  1368 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678742  1368 omaha_response_handler_action.cc:36] There are no updates. Aborting.
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678746  1368 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing.
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678748  1368 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678751  1368 update_attempter.cc:302] Processing Done.
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678767  1368 update_attempter.cc:338] No update.
Oct  2 20:42:33.678874 update_engine[1368]: I1002 20:42:33.678778  1368 update_check_scheduler.cc:74] Next update check in 45m35s
Oct  2 20:42:33.679514 locksmithd[1437]: LastCheckedTime=1696279353 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0
Oct  2 20:42:33.688165 kubelet[2468]: E1002 20:42:33.687868    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:42:34.118678 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.wD0b1X.mount: Deactivated successfully.
Oct  2 20:42:34.151393 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.1R6DZ7.mount: Deactivated successfully.
Oct  2 20:42:35.113926 systemd[1]: run-containerd-runc-k8s.io-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d-runc.istuHg.mount: Deactivated successfully.
Oct  2 20:42:40.014000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.019779 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 20:42:40.019893 kernel: audit: type=1400 audit(1696279360.014:1342): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.014000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.065958 kernel: audit: type=1400 audit(1696279360.014:1343): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.066130 kernel: audit: type=1300 audit(1696279360.014:1343): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=401373ccc0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.014000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=401373ccc0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.119449 kernel: audit: type=1327 audit(1696279360.014:1343): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.119596 kernel: audit: type=1300 audit(1696279360.014:1342): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40136eb040 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.014000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40136eb040 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.171906 kernel: audit: type=1327 audit(1696279360.014:1342): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.015000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.194664 kernel: audit: type=1400 audit(1696279360.015:1344): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.194779 kernel: audit: type=1300 audit(1696279360.015:1344): arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=401332db60 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.015000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=401332db60 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.247507 kernel: audit: type=1327 audit(1696279360.015:1344): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.066000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.270831 kernel: audit: type=1400 audit(1696279360.066:1345): avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.066000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=401332dc80 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.066000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.262000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.262000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=40136eba80 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:40.263000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:40.263000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=68 a1=401373cf30 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:42:40.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:42:41.059000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:41.059000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:41.059000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c7eae0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:41.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:41.059000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400276db90 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:41.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:41.689688 kubelet[2468]: E1002 20:42:41.689660    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:42:44.116977 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.zbhX3j.mount: Deactivated successfully.
Oct  2 20:42:44.153093 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.FTIAb2.mount: Deactivated successfully.
Oct  2 20:42:45.078000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.084800 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 20:42:45.084866 kernel: audit: type=1400 audit(1696279365.078:1350): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.078000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002765980 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.135813 kernel: audit: type=1300 audit(1696279365.078:1350): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002765980 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.161323 kernel: audit: type=1327 audit(1696279365.078:1350): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.082000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.184671 kernel: audit: type=1400 audit(1696279365.082:1351): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.082000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c7fa40 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.214119 kernel: audit: type=1300 audit(1696279365.082:1351): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c7fa40 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.214257 kernel: audit: type=1327 audit(1696279365.082:1351): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.082000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.260147 kernel: audit: type=1400 audit(1696279365.082:1352): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.260356 kernel: audit: type=1300 audit(1696279365.082:1352): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002765ba0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.082000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002765ba0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.313656 kernel: audit: type=1327 audit(1696279365.082:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:45.313771 kernel: audit: type=1400 audit(1696279365.084:1353): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.084000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:42:45.084000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002765cc0 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:42:45.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:42:46.687210 kubelet[2468]: E1002 20:42:46.687182    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:42:48.687534 kubelet[2468]: E1002 20:42:48.687500    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:42:52.687450 env[1379]: time="2023-10-02T20:42:52.687401657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 20:42:52.841620 env[1379]: time="2023-10-02T20:42:52.841560250Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:52.845971 env[1379]: time="2023-10-02T20:42:52.845924655Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:52.846335 kubelet[2468]: E1002 20:42:52.846300    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:42:52.846643 kubelet[2468]: E1002 20:42:52.846351    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 20:42:52.846643 kubelet[2468]: E1002 20:42:52.846465    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:52.847704 env[1379]: time="2023-10-02T20:42:52.847665577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 20:42:53.012188 env[1379]: time="2023-10-02T20:42:53.012125067Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:53.019022 env[1379]: time="2023-10-02T20:42:53.018976251Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:53.019377 kubelet[2468]: E1002 20:42:53.019337    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:42:53.019458 kubelet[2468]: E1002 20:42:53.019405    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 20:42:53.019507 kubelet[2468]: E1002 20:42:53.019485    2468 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-9zc8x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-nkzvw_calico-system(df7d8fb0-7726-4a14-858c-04cbad2f6486): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:53.019597 kubelet[2468]: E1002 20:42:53.019540    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:42:54.119152 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.Y55WcU.mount: Deactivated successfully.
Oct  2 20:42:55.112614 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.HbdfT9.mount: Deactivated successfully.
Oct  2 20:42:58.687979 env[1379]: time="2023-10-02T20:42:58.687936742Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:42:58.839920 env[1379]: time="2023-10-02T20:42:58.839850948Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:42:58.845253 env[1379]: time="2023-10-02T20:42:58.845199954Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:42:58.845688 kubelet[2468]: E1002 20:42:58.845645    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:58.845999 kubelet[2468]: E1002 20:42:58.845698    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:42:58.845999 kubelet[2468]: E1002 20:42:58.845822    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-zrr2z,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-scf82_calico-apiserver(307cdb1f-a25f-4ef5-8f7d-e773fa4aa121): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:42:58.845999 kubelet[2468]: E1002 20:42:58.845860    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:42:59.687476 kubelet[2468]: E1002 20:42:59.687439    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:43:04.119188 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.rrccFA.mount: Deactivated successfully.
Oct  2 20:43:05.114341 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.7XAIpE.mount: Deactivated successfully.
Oct  2 20:43:07.688728 kubelet[2468]: E1002 20:43:07.688696    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:43:12.687408 kubelet[2468]: E1002 20:43:12.687380    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:43:13.687220 env[1379]: time="2023-10-02T20:43:13.687150737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 20:43:13.908128 env[1379]: time="2023-10-02T20:43:13.907938895Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:43:13.912451 env[1379]: time="2023-10-02T20:43:13.912332771Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 20:43:13.912720 kubelet[2468]: E1002 20:43:13.912701    2468 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:43:13.913031 kubelet[2468]: E1002 20:43:13.913018    2468 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 20:43:13.913215 kubelet[2468]: E1002 20:43:13.913199    2468 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5kd6b,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-5f4f668697-5q6ks_calico-apiserver(36eccf69-43e4-4a46-8f84-a3969c49056b): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 20:43:13.913402 kubelet[2468]: E1002 20:43:13.913387    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:43:13.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.48:22-10.200.12.6:49974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:13.968211 systemd[1]: Started sshd@7-10.200.20.48:22-10.200.12.6:49974.service.
Oct  2 20:43:13.974465 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 20:43:13.974567 kernel: audit: type=1130 audit(1696279393.967:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.48:22-10.200.12.6:49974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:14.127871 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.LW9wy9.mount: Deactivated successfully.
Oct  2 20:43:14.389000 audit[5230]: USER_ACCT pid=5230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.389715 sshd[5230]: Accepted publickey for core from 10.200.12.6 port 49974 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:14.415412 kernel: audit: type=1101 audit(1696279394.389:1355): pid=5230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.416000 audit[5230]: CRED_ACQ pid=5230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.417550 sshd[5230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:14.458610 kernel: audit: type=1103 audit(1696279394.416:1356): pid=5230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.458735 kernel: audit: type=1006 audit(1696279394.416:1357): pid=5230 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1
Oct  2 20:43:14.416000 audit[5230]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe74b95f0 a2=3 a3=1 items=0 ppid=1 pid=5230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:14.482912 kernel: audit: type=1300 audit(1696279394.416:1357): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe74b95f0 a2=3 a3=1 items=0 ppid=1 pid=5230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:14.416000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:14.486939 systemd[1]: Started session-10.scope.
Oct  2 20:43:14.488172 systemd-logind[1363]: New session 10 of user core.
Oct  2 20:43:14.495102 kernel: audit: type=1327 audit(1696279394.416:1357): proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:14.496000 audit[5230]: USER_START pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.523000 audit[5274]: CRED_ACQ pid=5274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.546869 kernel: audit: type=1105 audit(1696279394.496:1358): pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.547007 kernel: audit: type=1103 audit(1696279394.523:1359): pid=5274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.846596 sshd[5230]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:14.847000 audit[5230]: USER_END pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.851202 systemd[1]: session-10.scope: Deactivated successfully.
Oct  2 20:43:14.851973 systemd[1]: sshd@7-10.200.20.48:22-10.200.12.6:49974.service: Deactivated successfully.
Oct  2 20:43:14.849000 audit[5230]: CRED_DISP pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.874382 kernel: audit: type=1106 audit(1696279394.847:1360): pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.874443 kernel: audit: type=1104 audit(1696279394.849:1361): pid=5230 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:14.874509 systemd-logind[1363]: Session 10 logged out. Waiting for processes to exit.
Oct  2 20:43:14.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.48:22-10.200.12.6:49974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:14.896862 systemd-logind[1363]: Removed session 10.
Oct  2 20:43:15.123181 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.R3heX3.mount: Deactivated successfully.
Oct  2 20:43:19.690298 kubelet[2468]: E1002 20:43:19.690256    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:43:24.122759 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.CrPm6a.mount: Deactivated successfully.
Oct  2 20:43:24.173882 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.Ms9uFj.mount: Deactivated successfully.
Oct  2 20:43:24.918026 systemd[1]: Started sshd@8-10.200.20.48:22-10.200.12.6:52606.service.
Oct  2 20:43:24.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.48:22-10.200.12.6:52606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:24.924044 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 20:43:24.945789 kernel: audit: type=1130 audit(1696279404.916:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.48:22-10.200.12.6:52606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:25.335000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.337568 sshd[5366]: Accepted publickey for core from 10.200.12.6 port 52606 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:25.339894 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:25.338000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.383389 kernel: audit: type=1101 audit(1696279405.335:1364): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.383501 kernel: audit: type=1103 audit(1696279405.338:1365): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.398071 kernel: audit: type=1006 audit(1696279405.338:1366): pid=5366 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1
Oct  2 20:43:25.338000 audit[5366]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc64a160 a2=3 a3=1 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:25.422474 kernel: audit: type=1300 audit(1696279405.338:1366): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc64a160 a2=3 a3=1 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:25.338000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:25.430804 kernel: audit: type=1327 audit(1696279405.338:1366): proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:25.431977 systemd[1]: Started session-11.scope.
Oct  2 20:43:25.432653 systemd-logind[1363]: New session 11 of user core.
Oct  2 20:43:25.435000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.460000 audit[5368]: CRED_ACQ pid=5368 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.482335 kernel: audit: type=1105 audit(1696279405.435:1367): pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.482584 kernel: audit: type=1103 audit(1696279405.460:1368): pid=5368 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.687479 kubelet[2468]: E1002 20:43:25.687115    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:43:25.689009 kubelet[2468]: E1002 20:43:25.688754    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:43:25.786983 sshd[5366]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:25.786000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.792006 systemd[1]: session-11.scope: Deactivated successfully.
Oct  2 20:43:25.792862 systemd[1]: sshd@8-10.200.20.48:22-10.200.12.6:52606.service: Deactivated successfully.
Oct  2 20:43:25.789000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.835537 kernel: audit: type=1106 audit(1696279405.786:1369): pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.835652 kernel: audit: type=1104 audit(1696279405.789:1370): pid=5366 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:25.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.48:22-10.200.12.6:52606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:25.835938 systemd-logind[1363]: Session 11 logged out. Waiting for processes to exit.
Oct  2 20:43:25.836762 systemd-logind[1363]: Removed session 11.
Oct  2 20:43:33.688077 kubelet[2468]: E1002 20:43:33.688040    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:43:35.859018 systemd[1]: Started sshd@9-10.200.20.48:22-10.200.12.6:45402.service.
Oct  2 20:43:35.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.48:22-10.200.12.6:45402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:35.864745 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 20:43:35.864859 kernel: audit: type=1130 audit(1696279415.858:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.48:22-10.200.12.6:45402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:36.278000 audit[5457]: USER_ACCT pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.279076 sshd[5457]: Accepted publickey for core from 10.200.12.6 port 45402 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:36.304000 audit[5457]: CRED_ACQ pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.305386 sshd[5457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:36.327660 kernel: audit: type=1101 audit(1696279416.278:1373): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.327767 kernel: audit: type=1103 audit(1696279416.304:1374): pid=5457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.342576 kernel: audit: type=1006 audit(1696279416.304:1375): pid=5457 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1
Oct  2 20:43:36.304000 audit[5457]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1d17440 a2=3 a3=1 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:36.368454 kernel: audit: type=1300 audit(1696279416.304:1375): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1d17440 a2=3 a3=1 items=0 ppid=1 pid=5457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:36.368589 kernel: audit: type=1327 audit(1696279416.304:1375): proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:36.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:36.378742 systemd[1]: Started session-12.scope.
Oct  2 20:43:36.378929 systemd-logind[1363]: New session 12 of user core.
Oct  2 20:43:36.383000 audit[5457]: USER_START pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.384000 audit[5459]: CRED_ACQ pid=5459 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.432414 kernel: audit: type=1105 audit(1696279416.383:1376): pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.432529 kernel: audit: type=1103 audit(1696279416.384:1377): pid=5459 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.687757 kubelet[2468]: E1002 20:43:36.687653    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:43:36.706264 sshd[5457]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:36.707000 audit[5457]: USER_END pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.709964 systemd[1]: session-12.scope: Deactivated successfully.
Oct  2 20:43:36.710820 systemd[1]: sshd@9-10.200.20.48:22-10.200.12.6:45402.service: Deactivated successfully.
Oct  2 20:43:36.708000 audit[5457]: CRED_DISP pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.755136 kernel: audit: type=1106 audit(1696279416.707:1378): pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.755226 kernel: audit: type=1104 audit(1696279416.708:1379): pid=5457 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:36.755369 systemd-logind[1363]: Session 12 logged out. Waiting for processes to exit.
Oct  2 20:43:36.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.48:22-10.200.12.6:45402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:36.756612 systemd-logind[1363]: Removed session 12.
Oct  2 20:43:36.777133 systemd[1]: Started sshd@10-10.200.20.48:22-10.200.12.6:45410.service.
Oct  2 20:43:36.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.48:22-10.200.12.6:45410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:37.196000 audit[5470]: USER_ACCT pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.196983 sshd[5470]: Accepted publickey for core from 10.200.12.6 port 45410 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:37.198934 sshd[5470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:37.198000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.198000 audit[5470]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe7d6ef0 a2=3 a3=1 items=0 ppid=1 pid=5470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:37.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:37.208487 systemd[1]: Started session-13.scope.
Oct  2 20:43:37.209878 systemd-logind[1363]: New session 13 of user core.
Oct  2 20:43:37.213000 audit[5470]: USER_START pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.216000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.738702 sshd[5470]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:37.739000 audit[5470]: USER_END pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.739000 audit[5470]: CRED_DISP pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:37.741434 systemd[1]: sshd@10-10.200.20.48:22-10.200.12.6:45410.service: Deactivated successfully.
Oct  2 20:43:37.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.48:22-10.200.12.6:45410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:37.742243 systemd[1]: session-13.scope: Deactivated successfully.
Oct  2 20:43:37.742814 systemd-logind[1363]: Session 13 logged out. Waiting for processes to exit.
Oct  2 20:43:37.743547 systemd-logind[1363]: Removed session 13.
Oct  2 20:43:37.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.48:22-10.200.12.6:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:37.809018 systemd[1]: Started sshd@11-10.200.20.48:22-10.200.12.6:46148.service.
Oct  2 20:43:38.232000 audit[5481]: USER_ACCT pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.232740 sshd[5481]: Accepted publickey for core from 10.200.12.6 port 46148 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:38.233000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.234000 audit[5481]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc8c4370 a2=3 a3=1 items=0 ppid=1 pid=5481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:38.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:38.234708 sshd[5481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:38.239293 systemd-logind[1363]: New session 14 of user core.
Oct  2 20:43:38.239937 systemd[1]: Started session-14.scope.
Oct  2 20:43:38.244000 audit[5481]: USER_START pid=5481 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.246000 audit[5483]: CRED_ACQ pid=5483 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.619917 sshd[5481]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:38.620000 audit[5481]: USER_END pid=5481 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.620000 audit[5481]: CRED_DISP pid=5481 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:38.623709 systemd-logind[1363]: Session 14 logged out. Waiting for processes to exit.
Oct  2 20:43:38.623866 systemd[1]: sshd@11-10.200.20.48:22-10.200.12.6:46148.service: Deactivated successfully.
Oct  2 20:43:38.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.48:22-10.200.12.6:46148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:38.624645 systemd[1]: session-14.scope: Deactivated successfully.
Oct  2 20:43:38.625518 systemd-logind[1363]: Removed session 14.
Oct  2 20:43:38.689154 kubelet[2468]: E1002 20:43:38.689123    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:43:40.015000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.015000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.015000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4007fbad20 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:40.016000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.016000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4007fbadb0 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.016000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:40.015000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4011df7c80 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:40.067000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.067000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007f6b140 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.067000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:40.263000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.263000 audit[2297]: AVC avc:  denied  { watch } for  pid=2297 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:40.263000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=401346f860 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:40.263000 audit[2297]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4007f6b230 a2=fc6 a3=0 items=0 ppid=2159 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c355,c876 key=(null)
Oct  2 20:43:40.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562
Oct  2 20:43:41.059000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:41.066224 kernel: kauditd_printk_skb: 41 callbacks suppressed
Oct  2 20:43:41.066356 kernel: audit: type=1400 audit(1696279421.059:1405): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:41.059000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a45260 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:41.118082 kernel: audit: type=1300 audit(1696279421.059:1405): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a45260 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:41.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:41.142556 kernel: audit: type=1327 audit(1696279421.059:1405): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:41.059000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:41.165283 kernel: audit: type=1400 audit(1696279421.059:1406): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:41.059000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021d2840 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:41.196263 kernel: audit: type=1300 audit(1696279421.059:1406): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021d2840 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:41.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:41.221577 kernel: audit: type=1327 audit(1696279421.059:1406): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:44.118622 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.QYdQXF.mount: Deactivated successfully.
Oct  2 20:43:45.078000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.078000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a44c00 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:45.132378 kernel: audit: type=1400 audit(1696279425.078:1407): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.132496 kernel: audit: type=1300 audit(1696279425.078:1407): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a44c00 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:45.078000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:45.156920 kernel: audit: type=1327 audit(1696279425.078:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:45.084000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.179456 kernel: audit: type=1400 audit(1696279425.084:1408): avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.084000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a44c20 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:45.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:45.100000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.100000 audit[2345]: AVC avc:  denied  { watch } for  pid=2345 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:43:45.100000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002a44d40 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:45.100000 audit[2345]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002b7d920 a2=fc6 a3=0 items=0 ppid=2195 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:43:45.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:45.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:43:48.688216 kubelet[2468]: E1002 20:43:48.688171    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:43:48.690426 systemd[1]: Started sshd@12-10.200.20.48:22-10.200.12.6:33652.service.
Oct  2 20:43:48.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.48:22-10.200.12.6:33652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:48.696046 kernel: kauditd_printk_skb: 8 callbacks suppressed
Oct  2 20:43:48.696166 kernel: audit: type=1130 audit(1696279428.689:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.48:22-10.200.12.6:33652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:49.109000 audit[5557]: USER_ACCT pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.111597 sshd[5557]: Accepted publickey for core from 10.200.12.6 port 33652 ssh2: RSA SHA256:pOhi17uv1dMw9wbwzof49dIVAjOqWAX9EZnbvXjLyxI
Oct  2 20:43:49.115465 sshd[5557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 20:43:49.113000 audit[5557]: CRED_ACQ pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.156398 kernel: audit: type=1101 audit(1696279429.109:1412): pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.156508 kernel: audit: type=1103 audit(1696279429.113:1413): pid=5557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.175585 kernel: audit: type=1006 audit(1696279429.113:1414): pid=5557 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1
Oct  2 20:43:49.113000 audit[5557]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2c00810 a2=3 a3=1 items=0 ppid=1 pid=5557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:49.200455 kernel: audit: type=1300 audit(1696279429.113:1414): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2c00810 a2=3 a3=1 items=0 ppid=1 pid=5557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:43:49.113000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:49.210432 kernel: audit: type=1327 audit(1696279429.113:1414): proctitle=737368643A20636F7265205B707269765D
Oct  2 20:43:49.211183 systemd-logind[1363]: New session 15 of user core.
Oct  2 20:43:49.211999 systemd[1]: Started session-15.scope.
Oct  2 20:43:49.216000 audit[5557]: USER_START pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.246896 kernel: audit: type=1105 audit(1696279429.216:1415): pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.244000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.269426 kernel: audit: type=1103 audit(1696279429.244:1416): pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.570575 sshd[5557]: pam_unix(sshd:session): session closed for user core
Oct  2 20:43:49.570000 audit[5557]: USER_END pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.571000 audit[5557]: CRED_DISP pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.598923 systemd[1]: sshd@12-10.200.20.48:22-10.200.12.6:33652.service: Deactivated successfully.
Oct  2 20:43:49.599809 systemd[1]: session-15.scope: Deactivated successfully.
Oct  2 20:43:49.620309 kernel: audit: type=1106 audit(1696279429.570:1417): pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.620431 kernel: audit: type=1104 audit(1696279429.571:1418): pid=5557 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success'
Oct  2 20:43:49.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.48:22-10.200.12.6:33652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 20:43:49.621313 systemd-logind[1363]: Session 15 logged out. Waiting for processes to exit.
Oct  2 20:43:49.622141 systemd-logind[1363]: Removed session 15.
Oct  2 20:43:49.687335 kubelet[2468]: E1002 20:43:49.687310    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:43:53.688165 kubelet[2468]: E1002 20:43:53.688139    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:43:54.113969 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.GMWIBH.mount: Deactivated successfully.
Oct  2 20:43:55.111280 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.JiudcO.mount: Deactivated successfully.
Oct  2 20:44:01.689548 kubelet[2468]: E1002 20:44:01.689512    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nkzvw" podUID="df7d8fb0-7726-4a14-858c-04cbad2f6486"
Oct  2 20:44:02.687621 kubelet[2468]: E1002 20:44:02.687583    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:44:03.028569 systemd[1]: cri-containerd-759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8.scope: Deactivated successfully.
Oct  2 20:44:03.028885 systemd[1]: cri-containerd-759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8.scope: Consumed 3.973s CPU time.
Oct  2 20:44:03.033000 audit: BPF prog-id=84 op=UNLOAD
Oct  2 20:44:03.038818 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 20:44:03.038926 kernel: audit: type=1334 audit(1696279443.033:1420): prog-id=84 op=UNLOAD
Oct  2 20:44:03.033000 audit: BPF prog-id=89 op=UNLOAD
Oct  2 20:44:03.058091 kernel: audit: type=1334 audit(1696279443.033:1421): prog-id=89 op=UNLOAD
Oct  2 20:44:03.075057 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8-rootfs.mount: Deactivated successfully.
Oct  2 20:44:03.092774 systemd[1]: cri-containerd-cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a.scope: Deactivated successfully.
Oct  2 20:44:03.093084 systemd[1]: cri-containerd-cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a.scope: Consumed 2.859s CPU time.
Oct  2 20:44:03.092000 audit: BPF prog-id=121 op=UNLOAD
Oct  2 20:44:03.100000 audit: BPF prog-id=124 op=UNLOAD
Oct  2 20:44:03.107837 kernel: audit: type=1334 audit(1696279443.092:1422): prog-id=121 op=UNLOAD
Oct  2 20:44:03.107996 kernel: audit: type=1334 audit(1696279443.100:1423): prog-id=124 op=UNLOAD
Oct  2 20:44:03.122691 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a-rootfs.mount: Deactivated successfully.
Oct  2 20:44:03.176396 env[1379]: time="2023-10-02T20:44:03.176312475Z" level=info msg="shim disconnected" id=759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8
Oct  2 20:44:03.176396 env[1379]: time="2023-10-02T20:44:03.176386197Z" level=warning msg="cleaning up after shim disconnected" id=759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8 namespace=k8s.io
Oct  2 20:44:03.176396 env[1379]: time="2023-10-02T20:44:03.176397517Z" level=info msg="cleaning up dead shim"
Oct  2 20:44:03.177210 env[1379]: time="2023-10-02T20:44:03.177106492Z" level=info msg="shim disconnected" id=cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a
Oct  2 20:44:03.177342 env[1379]: time="2023-10-02T20:44:03.177323577Z" level=warning msg="cleaning up after shim disconnected" id=cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a namespace=k8s.io
Oct  2 20:44:03.177439 env[1379]: time="2023-10-02T20:44:03.177425579Z" level=info msg="cleaning up dead shim"
Oct  2 20:44:03.193402 env[1379]: time="2023-10-02T20:44:03.193352236Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:44:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5658 runtime=io.containerd.runc.v2\n"
Oct  2 20:44:03.195095 env[1379]: time="2023-10-02T20:44:03.195051992Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:44:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5657 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T20:44:03Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n"
Oct  2 20:44:03.242403 kubelet[2468]: I1002 20:44:03.242041    2468 scope.go:117] "RemoveContainer" containerID="cc9e5315421393bc60cb76e01b1f0bff7f78b8245d3638037a9bc186c405676a"
Oct  2 20:44:03.245906 env[1379]: time="2023-10-02T20:44:03.245867707Z" level=info msg="CreateContainer within sandbox \"ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}"
Oct  2 20:44:03.247824 kubelet[2468]: I1002 20:44:03.247792    2468 scope.go:117] "RemoveContainer" containerID="759b0085fb994ec3626611c3364ef2ab695d2694bae54e935f7a63c8f9fa7df8"
Oct  2 20:44:03.250409 env[1379]: time="2023-10-02T20:44:03.250346682Z" level=info msg="CreateContainer within sandbox \"63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}"
Oct  2 20:44:03.278563 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount269070087.mount: Deactivated successfully.
Oct  2 20:44:03.310291 env[1379]: time="2023-10-02T20:44:03.310243189Z" level=info msg="CreateContainer within sandbox \"ea18b73b55eda1f052cd32e5006569b5046ead66b0cbbecb2400a33705caa891\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"cea6071d7b82d0ac341bb0b689cb1ed27c50a09a092228e9bf8645c15987fada\""
Oct  2 20:44:03.311026 env[1379]: time="2023-10-02T20:44:03.310999645Z" level=info msg="StartContainer for \"cea6071d7b82d0ac341bb0b689cb1ed27c50a09a092228e9bf8645c15987fada\""
Oct  2 20:44:03.319520 env[1379]: time="2023-10-02T20:44:03.319487825Z" level=info msg="CreateContainer within sandbox \"63611f9dc5c0b1265576f1a988a8bed0c50f86adfe583a580d7467ad162e1966\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"6c962e2e908c7875ab46b17e8c71fd150ddcbd84cd7ba4686345f581c4e4111e\""
Oct  2 20:44:03.320146 env[1379]: time="2023-10-02T20:44:03.320113238Z" level=info msg="StartContainer for \"6c962e2e908c7875ab46b17e8c71fd150ddcbd84cd7ba4686345f581c4e4111e\""
Oct  2 20:44:03.338024 systemd[1]: Started cri-containerd-cea6071d7b82d0ac341bb0b689cb1ed27c50a09a092228e9bf8645c15987fada.scope.
Oct  2 20:44:03.350930 systemd[1]: Started cri-containerd-6c962e2e908c7875ab46b17e8c71fd150ddcbd84cd7ba4686345f581c4e4111e.scope.
Oct  2 20:44:03.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.400337 kernel: audit: type=1400 audit(1696279443.363:1424): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.400459 kernel: audit: type=1400 audit(1696279443.364:1425): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.418213 kernel: audit: type=1400 audit(1696279443.364:1426): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.436280 kernel: audit: type=1400 audit(1696279443.364:1427): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.460681 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 20:44:03.460774 kernel: audit: type=1400 audit(1696279443.364:1428): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.364000 audit: BPF prog-id=185 op=LOAD
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2649 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613630373164376238326430616333343162623062363839636231
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2649 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613630373164376238326430616333343162623062363839636231
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.373000 audit: BPF prog-id=186 op=LOAD
Oct  2 20:44:03.373000 audit[5695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2649 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613630373164376238326430616333343162623062363839636231
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.381000 audit: BPF prog-id=187 op=LOAD
Oct  2 20:44:03.381000 audit[5695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2649 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613630373164376238326430616333343162623062363839636231
Oct  2 20:44:03.381000 audit: BPF prog-id=187 op=UNLOAD
Oct  2 20:44:03.382000 audit: BPF prog-id=186 op=UNLOAD
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { perfmon } for  pid=5695 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit[5695]: AVC avc:  denied  { bpf } for  pid=5695 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.382000 audit: BPF prog-id=188 op=LOAD
Oct  2 20:44:03.382000 audit[5695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2649 pid=5695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365613630373164376238326430616333343162623062363839636231
Oct  2 20:44:03.436000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.436000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.436000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.437000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.437000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.437000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.437000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.443000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.461000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.461000 audit[5709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2195 pid=5709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663393632653265393038633738373561623436623137653863373166
Oct  2 20:44:03.463000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.463000 audit[5709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2195 pid=5709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663393632653265393038633738373561623436623137653863373166
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit: BPF prog-id=190 op=LOAD
Oct  2 20:44:03.465000 audit[5709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2195 pid=5709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663393632653265393038633738373561623436623137653863373166
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit: BPF prog-id=191 op=LOAD
Oct  2 20:44:03.465000 audit[5709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2195 pid=5709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663393632653265393038633738373561623436623137653863373166
Oct  2 20:44:03.465000 audit: BPF prog-id=191 op=UNLOAD
Oct  2 20:44:03.465000 audit: BPF prog-id=190 op=UNLOAD
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { perfmon } for  pid=5709 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit[5709]: AVC avc:  denied  { bpf } for  pid=5709 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:03.465000 audit: BPF prog-id=192 op=LOAD
Oct  2 20:44:03.465000 audit[5709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2195 pid=5709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:03.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663393632653265393038633738373561623436623137653863373166
Oct  2 20:44:03.486003 env[1379]: time="2023-10-02T20:44:03.485959027Z" level=info msg="StartContainer for \"cea6071d7b82d0ac341bb0b689cb1ed27c50a09a092228e9bf8645c15987fada\" returns successfully"
Oct  2 20:44:03.503237 env[1379]: time="2023-10-02T20:44:03.503162391Z" level=info msg="StartContainer for \"6c962e2e908c7875ab46b17e8c71fd150ddcbd84cd7ba4686345f581c4e4111e\" returns successfully"
Oct  2 20:44:04.076344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount880239042.mount: Deactivated successfully.
Oct  2 20:44:04.122648 systemd[1]: run-containerd-runc-k8s.io-66632d4c35fa6c580a804d6721482c573918a45da26e23ad3e004e40a948ac23-runc.tDkd6S.mount: Deactivated successfully.
Oct  2 20:44:04.421346 kubelet[2468]: E1002 20:44:04.421164    2468 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-c505880dad.178a65292c004728", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-c505880dad", UID:"bffc04f2827b4beb463b626d42bec6aa", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-c505880dad"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 43, 57, 164693288, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 43, 57, 164693288, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.0-a-c505880dad"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.48:57894->10.200.20.15:2379: read: connection timed out' (will not retry!)
Oct  2 20:44:04.425421 kubelet[2468]: I1002 20:44:04.425399    2468 status_manager.go:853] "Failed to get status for pod" podUID="53dd619e-0edd-41e3-a171-4492da1e066a" pod="tigera-operator/tigera-operator-8547bd6cc6-cgnmx" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.48:58006->10.200.20.15:2379: read: connection timed out"
Oct  2 20:44:04.680083 kubelet[2468]: E1002 20:44:04.679772    2468 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.48:58078->10.200.20.15:2379: read: connection timed out"
Oct  2 20:44:05.033000 audit[5731]: AVC avc:  denied  { watch } for  pid=5731 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:44:05.033000 audit[5731]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003c8900 a2=fc6 a3=0 items=0 ppid=2195 pid=5731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:44:05.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:44:05.034000 audit[5731]: AVC avc:  denied  { watch } for  pid=5731 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 20:44:05.034000 audit[5731]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000154740 a2=fc6 a3=0 items=0 ppid=2195 pid=5731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c320,c822 key=(null)
Oct  2 20:44:05.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 20:44:05.687148 kubelet[2468]: E1002 20:44:05.687110    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-5q6ks" podUID="36eccf69-43e4-4a46-8f84-a3969c49056b"
Oct  2 20:44:09.806737 systemd[1]: cri-containerd-9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00.scope: Deactivated successfully.
Oct  2 20:44:09.829684 kernel: kauditd_printk_skb: 120 callbacks suppressed
Oct  2 20:44:09.829771 kernel: audit: type=1334 audit(1696279449.811:1459): prog-id=88 op=UNLOAD
Oct  2 20:44:09.829807 kernel: audit: type=1334 audit(1696279449.811:1460): prog-id=90 op=UNLOAD
Oct  2 20:44:09.811000 audit: BPF prog-id=88 op=UNLOAD
Oct  2 20:44:09.811000 audit: BPF prog-id=90 op=UNLOAD
Oct  2 20:44:09.807034 systemd[1]: cri-containerd-9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00.scope: Consumed 2.934s CPU time.
Oct  2 20:44:09.845319 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00-rootfs.mount: Deactivated successfully.
Oct  2 20:44:09.908355 env[1379]: time="2023-10-02T20:44:09.908217067Z" level=info msg="shim disconnected" id=9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00
Oct  2 20:44:09.908834 env[1379]: time="2023-10-02T20:44:09.908808957Z" level=warning msg="cleaning up after shim disconnected" id=9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00 namespace=k8s.io
Oct  2 20:44:09.908900 env[1379]: time="2023-10-02T20:44:09.908886999Z" level=info msg="cleaning up dead shim"
Oct  2 20:44:09.922598 env[1379]: time="2023-10-02T20:44:09.922561485Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:44:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5834 runtime=io.containerd.runc.v2\n"
Oct  2 20:44:10.269904 kubelet[2468]: I1002 20:44:10.269562    2468 scope.go:117] "RemoveContainer" containerID="9e39c0a3a943207342bdb41a72a00bd62bc71faee4f67266c6ffe0158ccc1f00"
Oct  2 20:44:10.271892 env[1379]: time="2023-10-02T20:44:10.271852765Z" level=info msg="CreateContainer within sandbox \"64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}"
Oct  2 20:44:10.334820 env[1379]: time="2023-10-02T20:44:10.334764627Z" level=info msg="CreateContainer within sandbox \"64b04139135f99452ed3ab91bb5e8f03239abc8f6a5cde5b0a25933e5fffa10e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"4aa5d97e1acea7168e5fa9b607ceaccfc9f6f57793f07748a4ff634d737b4b97\""
Oct  2 20:44:10.335414 env[1379]: time="2023-10-02T20:44:10.335386318Z" level=info msg="StartContainer for \"4aa5d97e1acea7168e5fa9b607ceaccfc9f6f57793f07748a4ff634d737b4b97\""
Oct  2 20:44:10.359900 systemd[1]: Started cri-containerd-4aa5d97e1acea7168e5fa9b607ceaccfc9f6f57793f07748a4ff634d737b4b97.scope.
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.415012 kernel: audit: type=1400 audit(1696279450.378:1461): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.415177 kernel: audit: type=1400 audit(1696279450.378:1462): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.415214 kernel: audit: type=1400 audit(1696279450.378:1463): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.449900 kernel: audit: type=1400 audit(1696279450.378:1464): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.450070 kernel: audit: type=1400 audit(1696279450.378:1465): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.485427 kernel: audit: type=1400 audit(1696279450.378:1466): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.506210 kernel: audit: type=1400 audit(1696279450.378:1467): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.506308 kernel: audit: type=1400 audit(1696279450.378:1468): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.378000 audit: BPF prog-id=193 op=LOAD
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2236 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:10.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613564393765316163656137313638653566613962363037636561
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2236 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:10.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613564393765316163656137313638653566613962363037636561
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.396000 audit: BPF prog-id=194 op=LOAD
Oct  2 20:44:10.396000 audit[5854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2236 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:10.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613564393765316163656137313638653566613962363037636561
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit: BPF prog-id=195 op=LOAD
Oct  2 20:44:10.397000 audit[5854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2236 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:10.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613564393765316163656137313638653566613962363037636561
Oct  2 20:44:10.397000 audit: BPF prog-id=195 op=UNLOAD
Oct  2 20:44:10.397000 audit: BPF prog-id=194 op=UNLOAD
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { perfmon } for  pid=5854 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit[5854]: AVC avc:  denied  { bpf } for  pid=5854 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 20:44:10.397000 audit: BPF prog-id=196 op=LOAD
Oct  2 20:44:10.397000 audit[5854]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2236 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 20:44:10.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613564393765316163656137313638653566613962363037636561
Oct  2 20:44:10.548398 env[1379]: time="2023-10-02T20:44:10.548333209Z" level=info msg="StartContainer for \"4aa5d97e1acea7168e5fa9b607ceaccfc9f6f57793f07748a4ff634d737b4b97\" returns successfully"
Oct  2 20:44:13.689155 kubelet[2468]: E1002 20:44:13.689114    2468 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5f4f668697-scf82" podUID="307cdb1f-a25f-4ef5-8f7d-e773fa4aa121"
Oct  2 20:44:13.690374 env[1379]: time="2023-10-02T20:44:13.690320061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 20:44:13.844174 env[1379]: time="2023-10-02T20:44:13.843982973Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 20:44:13.854523 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.854859 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.863524 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.871849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.896394 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.896759 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.904533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.913170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.936801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.936998 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.945389 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.953559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.977757 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.977987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.985656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:13.993790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.017474 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.017751 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.026683 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.034958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.060116 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.060447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.068489 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.076643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.084746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.092718 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.100763 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.108926 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.117106 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.125678 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.135080 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.141835 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.149854 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.157852 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.166258 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.174405 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.183209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.191321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.199178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.207023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.215056 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.223116 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.231201 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.239190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.247126 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.254854 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.262492 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.270058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.277941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.285592 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.293399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.301326 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.309091 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.316939 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.324830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.332908 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.341070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.349380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.358211 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.366252 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.374209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.382466 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.390035 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.397587 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.405646 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.414276 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.422181 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.430170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.437958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.446153 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.453991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.461859 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.469707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.477786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.485533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.493507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.503592 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.509697 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.509171 systemd[1]: run-containerd-runc-k8s.io-e9dd8fddf45ba70fcdc890600ae22126150fdf349867178ce657685901028e5d-runc.AzdAPG.mount: Deactivated successfully.
Oct  2 20:44:14.516412 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.524076 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.532087 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.540396 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.548798 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.557937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.566082 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.574429 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.582465 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.591005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.600760 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.606880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.614833 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.622846 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.630348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.637921 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.645326 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.653064 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.660817 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.668331 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.675944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.680476 kubelet[2468]: E1002 20:44:14.680449    2468 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-c505880dad?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Oct  2 20:44:14.684013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.690965 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.698713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.706289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.713931 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.721542 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.729137 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.736962 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.744436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.752141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.759644 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.767727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.775290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.783235 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.791097 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.798841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.806310 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.813856 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.821375 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.828849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.836336 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.844635 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.852398 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.860245 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.868372 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.876664 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.884598 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.892722 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.900413 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.908655 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.916403 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.924695 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.932609 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.941037 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.949071 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.957122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.965205 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.973258 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.980798 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.988575 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:14.996434 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.004142 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.011680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.019636 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.027329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.035240 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.043063 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.051070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.058933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.067312 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.074995 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.082599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.090449 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.099112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.107210 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.114787 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.122260 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.130131 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.137810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.145976 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.154097 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.161980 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.170083 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.178117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.185824 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.193624 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.201162 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.209573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.217626 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.225208 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.233239 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.241077 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.248758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.256773 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.264632 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.273046 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.281225 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.289545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.297808 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.306199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.314874 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.323119 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.331411 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.339471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.347769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.355523 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.363504 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.371004 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.378918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.386732 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.394672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.402290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.409950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.417621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.425589 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.433425 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.440805 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.448278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.456090 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.464062 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.472018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.479842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#1 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.488014 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.496144 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#53 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.504174 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001
Oct  2 20:44:15.512044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#0 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001