Oct 2 19:25:32.135448 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:25:32.135494 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:25:32.135512 kernel: BIOS-provided physical RAM map: Oct 2 19:25:32.135525 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Oct 2 19:25:32.135538 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Oct 2 19:25:32.135551 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Oct 2 19:25:32.135570 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Oct 2 19:25:32.135584 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Oct 2 19:25:32.135597 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Oct 2 19:25:32.135611 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Oct 2 19:25:32.135625 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Oct 2 19:25:32.135638 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Oct 2 19:25:32.135651 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Oct 2 19:25:32.135665 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Oct 2 19:25:32.135685 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Oct 2 19:25:32.135700 kernel: NX (Execute Disable) protection: active Oct 2 19:25:32.135715 kernel: efi: EFI v2.70 by EDK II Oct 2 19:25:32.135730 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe386218 RNG=0xbfb73018 TPMEventLog=0xbe2c8018 Oct 2 19:25:32.135745 kernel: random: crng init done Oct 2 19:25:32.135758 kernel: SMBIOS 2.4 present. Oct 2 19:25:32.135769 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Oct 2 19:25:32.135781 kernel: Hypervisor detected: KVM Oct 2 19:25:32.135798 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:25:32.135811 kernel: kvm-clock: cpu 0, msr 1b3f8a001, primary cpu clock Oct 2 19:25:32.135825 kernel: kvm-clock: using sched offset of 13540915428 cycles Oct 2 19:25:32.135841 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:25:32.135855 kernel: tsc: Detected 2299.998 MHz processor Oct 2 19:25:32.135870 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:25:32.135886 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:25:32.135901 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Oct 2 19:25:32.135916 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:25:32.135946 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Oct 2 19:25:32.135965 kernel: Using GB pages for direct mapping Oct 2 19:25:32.135979 kernel: Secure boot disabled Oct 2 19:25:32.135994 kernel: ACPI: Early table checksum verification disabled Oct 2 19:25:32.136007 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Oct 2 19:25:32.136022 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Oct 2 19:25:32.136036 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Oct 2 19:25:32.136050 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Oct 2 19:25:32.136065 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Oct 2 19:25:32.136131 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Oct 2 19:25:32.136147 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Oct 2 19:25:32.136164 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Oct 2 19:25:32.136180 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Oct 2 19:25:32.136198 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Oct 2 19:25:32.136214 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Oct 2 19:25:32.136235 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Oct 2 19:25:32.136251 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Oct 2 19:25:32.136272 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Oct 2 19:25:32.136289 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Oct 2 19:25:32.136305 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Oct 2 19:25:32.136321 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Oct 2 19:25:32.136337 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Oct 2 19:25:32.136353 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Oct 2 19:25:32.136370 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Oct 2 19:25:32.136391 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:25:32.136407 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:25:32.136430 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:25:32.136447 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Oct 2 19:25:32.136463 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Oct 2 19:25:32.136480 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Oct 2 19:25:32.136497 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Oct 2 19:25:32.136514 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Oct 2 19:25:32.136530 kernel: Zone ranges: Oct 2 19:25:32.136551 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:25:32.136568 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:25:32.136582 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:25:32.136598 kernel: Movable zone start for each node Oct 2 19:25:32.136612 kernel: Early memory node ranges Oct 2 19:25:32.136628 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Oct 2 19:25:32.136644 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Oct 2 19:25:32.136661 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Oct 2 19:25:32.136678 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Oct 2 19:25:32.136698 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:25:32.136715 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Oct 2 19:25:32.136731 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:25:32.136748 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Oct 2 19:25:32.136765 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Oct 2 19:25:32.136781 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Oct 2 19:25:32.136798 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Oct 2 19:25:32.136814 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:25:32.136831 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:25:32.136851 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:25:32.136868 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:25:32.136884 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:25:32.136901 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:25:32.136917 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:25:32.136933 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:25:32.136950 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:25:32.136966 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Oct 2 19:25:32.136983 kernel: Booting paravirtualized kernel on KVM Oct 2 19:25:32.137003 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:25:32.137020 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:25:32.137037 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:25:32.137054 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:25:32.137071 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:25:32.140661 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:25:32.140682 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:25:32.140711 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Oct 2 19:25:32.140728 kernel: Policy zone: Normal Oct 2 19:25:32.140755 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:25:32.140773 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:25:32.140790 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:25:32.140808 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:25:32.140825 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:25:32.140842 kernel: Memory: 7536584K/7860584K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 323740K reserved, 0K cma-reserved) Oct 2 19:25:32.140859 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:25:32.140876 kernel: Kernel/User page tables isolation: enabled Oct 2 19:25:32.140896 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:25:32.140911 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:25:32.140926 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:25:32.140944 kernel: rcu: RCU event tracing is enabled. Oct 2 19:25:32.140961 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:25:32.140978 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:25:32.140995 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:25:32.141012 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:25:32.141029 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:25:32.141050 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:25:32.141116 kernel: Console: colour dummy device 80x25 Oct 2 19:25:32.141133 kernel: printk: console [ttyS0] enabled Oct 2 19:25:32.141153 kernel: ACPI: Core revision 20210730 Oct 2 19:25:32.141169 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:25:32.141185 kernel: x2apic enabled Oct 2 19:25:32.141201 kernel: Switched APIC routing to physical x2apic. Oct 2 19:25:32.141217 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Oct 2 19:25:32.141233 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:25:32.141250 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Oct 2 19:25:32.141275 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Oct 2 19:25:32.141291 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Oct 2 19:25:32.141307 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:25:32.141323 kernel: Spectre V2 : Mitigation: IBRS Oct 2 19:25:32.141340 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:25:32.141357 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:25:32.141375 kernel: RETBleed: Mitigation: IBRS Oct 2 19:25:32.141392 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:25:32.141408 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Oct 2 19:25:32.141431 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:25:32.141448 kernel: MDS: Mitigation: Clear CPU buffers Oct 2 19:25:32.141464 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:25:32.141480 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:25:32.141496 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:25:32.141512 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:25:32.141531 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:25:32.141548 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:25:32.141564 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:25:32.141580 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:25:32.141596 kernel: LSM: Security Framework initializing Oct 2 19:25:32.141612 kernel: SELinux: Initializing. Oct 2 19:25:32.141628 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:25:32.141644 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:25:32.141660 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Oct 2 19:25:32.141680 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Oct 2 19:25:32.141696 kernel: signal: max sigframe size: 1776 Oct 2 19:25:32.141712 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:25:32.141728 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:25:32.141744 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:25:32.141760 kernel: x86: Booting SMP configuration: Oct 2 19:25:32.141776 kernel: .... node #0, CPUs: #1 Oct 2 19:25:32.141792 kernel: kvm-clock: cpu 1, msr 1b3f8a041, secondary cpu clock Oct 2 19:25:32.141808 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:25:32.141829 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:25:32.141846 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:25:32.141861 kernel: smpboot: Max logical packages: 1 Oct 2 19:25:32.141878 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Oct 2 19:25:32.141894 kernel: devtmpfs: initialized Oct 2 19:25:32.141910 kernel: x86/mm: Memory block size: 128MB Oct 2 19:25:32.141926 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Oct 2 19:25:32.141943 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:25:32.141959 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:25:32.141978 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:25:32.141995 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:25:32.142012 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:25:32.142028 kernel: audit: type=2000 audit(1696274730.948:1): state=initialized audit_enabled=0 res=1 Oct 2 19:25:32.142045 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:25:32.142060 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:25:32.142087 kernel: cpuidle: using governor menu Oct 2 19:25:32.142103 kernel: ACPI: bus type PCI registered Oct 2 19:25:32.142119 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:25:32.142142 kernel: dca service started, version 1.12.1 Oct 2 19:25:32.142160 kernel: PCI: Using configuration type 1 for base access Oct 2 19:25:32.142178 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:25:32.142196 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:25:32.142214 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:25:32.142232 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:25:32.142250 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:25:32.142268 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:25:32.142286 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:25:32.142309 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:25:32.142327 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:25:32.142345 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:25:32.142363 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:25:32.142380 kernel: ACPI: Interpreter enabled Oct 2 19:25:32.142398 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:25:32.142425 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:25:32.142443 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:25:32.142460 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:25:32.142484 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:25:32.142746 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:25:32.142912 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:25:32.142934 kernel: PCI host bridge to bus 0000:00 Oct 2 19:25:32.143350 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:25:32.143518 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:25:32.143829 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:25:32.144161 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Oct 2 19:25:32.144308 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:25:32.144485 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:25:32.144661 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Oct 2 19:25:32.144833 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:25:32.145004 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:25:32.145203 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Oct 2 19:25:32.145371 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Oct 2 19:25:32.145536 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Oct 2 19:25:32.145729 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:25:32.145895 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Oct 2 19:25:32.146064 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Oct 2 19:25:32.146258 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:25:32.146422 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:25:32.146587 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Oct 2 19:25:32.146610 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:25:32.146629 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:25:32.146646 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:25:32.146664 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:25:32.146682 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:25:32.146704 kernel: iommu: Default domain type: Translated Oct 2 19:25:32.146721 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:25:32.146739 kernel: vgaarb: loaded Oct 2 19:25:32.146758 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:25:32.146775 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:25:32.146793 kernel: PTP clock support registered Oct 2 19:25:32.146841 kernel: Registered efivars operations Oct 2 19:25:32.146859 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:25:32.146877 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:25:32.146899 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Oct 2 19:25:32.146924 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Oct 2 19:25:32.146941 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Oct 2 19:25:32.146959 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Oct 2 19:25:32.146976 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:25:32.146993 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:25:32.147012 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:25:32.147029 kernel: pnp: PnP ACPI init Oct 2 19:25:32.147047 kernel: pnp: PnP ACPI: found 7 devices Oct 2 19:25:32.147069 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:25:32.147100 kernel: NET: Registered PF_INET protocol family Oct 2 19:25:32.147119 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:25:32.147137 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:25:32.147155 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:25:32.147173 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:25:32.147191 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:25:32.147209 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:25:32.147226 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:25:32.147247 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:25:32.147264 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:25:32.147282 kernel: NET: Registered PF_XDP protocol family Oct 2 19:25:32.147444 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:25:32.147585 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:25:32.147723 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:25:32.147858 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Oct 2 19:25:32.148033 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:25:32.148063 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:25:32.148107 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:25:32.148126 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Oct 2 19:25:32.148144 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:25:32.148162 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:25:32.148180 kernel: clocksource: Switched to clocksource tsc Oct 2 19:25:32.148197 kernel: Initialise system trusted keyrings Oct 2 19:25:32.148215 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:25:32.148237 kernel: Key type asymmetric registered Oct 2 19:25:32.148254 kernel: Asymmetric key parser 'x509' registered Oct 2 19:25:32.148271 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:25:32.148288 kernel: io scheduler mq-deadline registered Oct 2 19:25:32.148306 kernel: io scheduler kyber registered Oct 2 19:25:32.148323 kernel: io scheduler bfq registered Oct 2 19:25:32.148341 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:25:32.148359 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:25:32.148561 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Oct 2 19:25:32.148589 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:25:32.148753 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Oct 2 19:25:32.148777 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:25:32.148949 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Oct 2 19:25:32.148972 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:25:32.148991 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:25:32.149009 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:25:32.149027 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Oct 2 19:25:32.149045 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Oct 2 19:25:32.149239 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Oct 2 19:25:32.149264 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:25:32.149283 kernel: i8042: Warning: Keylock active Oct 2 19:25:32.149300 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:25:32.149318 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:25:32.149481 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:25:32.149631 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:25:32.149786 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:25:31 UTC (1696274731) Oct 2 19:25:32.149941 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:25:32.149964 kernel: intel_pstate: CPU model not supported Oct 2 19:25:32.149982 kernel: pstore: Registered efi as persistent store backend Oct 2 19:25:32.150000 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:25:32.150018 kernel: Segment Routing with IPv6 Oct 2 19:25:32.150036 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:25:32.150053 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:25:32.150071 kernel: Key type dns_resolver registered Oct 2 19:25:32.150119 kernel: IPI shorthand broadcast: enabled Oct 2 19:25:32.150137 kernel: sched_clock: Marking stable (781102453, 233302681)->(1182253724, -167848590) Oct 2 19:25:32.150155 kernel: registered taskstats version 1 Oct 2 19:25:32.150173 kernel: Loading compiled-in X.509 certificates Oct 2 19:25:32.150191 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:25:32.150209 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:25:32.150226 kernel: Key type .fscrypt registered Oct 2 19:25:32.150243 kernel: Key type fscrypt-provisioning registered Oct 2 19:25:32.150262 kernel: pstore: Using crash dump compression: deflate Oct 2 19:25:32.150284 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:25:32.150302 kernel: ima: No architecture policies found Oct 2 19:25:32.150320 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:25:32.150338 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:25:32.150356 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:25:32.150374 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:25:32.150392 kernel: Run /init as init process Oct 2 19:25:32.150410 kernel: with arguments: Oct 2 19:25:32.150430 kernel: /init Oct 2 19:25:32.150447 kernel: with environment: Oct 2 19:25:32.150464 kernel: HOME=/ Oct 2 19:25:32.150481 kernel: TERM=linux Oct 2 19:25:32.150499 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:25:32.150519 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:25:32.150541 systemd[1]: Detected virtualization kvm. Oct 2 19:25:32.150561 systemd[1]: Detected architecture x86-64. Oct 2 19:25:32.150583 systemd[1]: Running in initrd. Oct 2 19:25:32.150601 systemd[1]: No hostname configured, using default hostname. Oct 2 19:25:32.150620 systemd[1]: Hostname set to . Oct 2 19:25:32.150639 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:25:32.150657 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:25:32.150675 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:25:32.150694 systemd[1]: Reached target cryptsetup.target. Oct 2 19:25:32.150712 systemd[1]: Reached target paths.target. Oct 2 19:25:32.150734 systemd[1]: Reached target slices.target. Oct 2 19:25:32.150752 systemd[1]: Reached target swap.target. Oct 2 19:25:32.150771 systemd[1]: Reached target timers.target. Oct 2 19:25:32.150790 systemd[1]: Listening on iscsid.socket. Oct 2 19:25:32.150809 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:25:32.150827 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:25:32.150846 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:25:32.150868 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:25:32.150887 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:25:32.150906 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:25:32.150932 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:25:32.150950 systemd[1]: Reached target sockets.target. Oct 2 19:25:32.150969 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:25:32.150988 systemd[1]: Finished network-cleanup.service. Oct 2 19:25:32.151007 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:25:32.151026 systemd[1]: Starting systemd-journald.service... Oct 2 19:25:32.151048 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:25:32.151066 systemd[1]: Starting systemd-resolved.service... Oct 2 19:25:32.151162 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:25:32.151200 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:25:32.151229 systemd-journald[188]: Journal started Oct 2 19:25:32.155248 systemd-journald[188]: Runtime Journal (/run/log/journal/859957698657b854b5366128085c41b4) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:25:32.155323 kernel: audit: type=1130 audit(1696274732.150:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.155361 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:25:32.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.156756 systemd-modules-load[189]: Inserted module 'overlay' Oct 2 19:25:32.172063 systemd[1]: Started systemd-journald.service. Oct 2 19:25:32.172180 kernel: audit: type=1130 audit(1696274732.164:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.176797 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:25:32.200930 kernel: audit: type=1130 audit(1696274732.175:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.200968 kernel: audit: type=1130 audit(1696274732.185:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.187732 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:25:32.197536 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:25:32.204763 systemd-resolved[190]: Positive Trust Anchors: Oct 2 19:25:32.204791 systemd-resolved[190]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:25:32.204846 systemd-resolved[190]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:25:32.213521 systemd-resolved[190]: Defaulting to hostname 'linux'. Oct 2 19:25:32.223570 systemd[1]: Started systemd-resolved.service. Oct 2 19:25:32.224015 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:25:32.224271 systemd[1]: Reached target nss-lookup.target. Oct 2 19:25:32.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.231109 kernel: audit: type=1130 audit(1696274732.222:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.236104 kernel: audit: type=1130 audit(1696274732.223:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.241193 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:25:32.245189 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:25:32.266250 kernel: Bridge firewalling registered Oct 2 19:25:32.266299 kernel: audit: type=1130 audit(1696274732.249:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.247458 systemd-modules-load[189]: Inserted module 'br_netfilter' Oct 2 19:25:32.251764 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:25:32.274381 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:25:32.278221 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:25:32.289243 kernel: SCSI subsystem initialized Oct 2 19:25:32.303608 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:25:32.303684 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:25:32.304973 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:25:32.310511 systemd-modules-load[189]: Inserted module 'dm_multipath' Oct 2 19:25:32.311862 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:25:32.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.328144 kernel: audit: type=1130 audit(1696274732.322:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.324589 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:25:32.339569 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:25:32.350261 kernel: audit: type=1130 audit(1696274732.342:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.381113 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:25:32.395120 kernel: iscsi: registered transport (tcp) Oct 2 19:25:32.419110 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:25:32.419200 kernel: QLogic iSCSI HBA Driver Oct 2 19:25:32.464962 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:25:32.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.466356 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:25:32.531172 kernel: raid6: avx2x4 gen() 17579 MB/s Oct 2 19:25:32.552142 kernel: raid6: avx2x4 xor() 7393 MB/s Oct 2 19:25:32.573132 kernel: raid6: avx2x2 gen() 17878 MB/s Oct 2 19:25:32.594125 kernel: raid6: avx2x2 xor() 18471 MB/s Oct 2 19:25:32.615132 kernel: raid6: avx2x1 gen() 13570 MB/s Oct 2 19:25:32.636123 kernel: raid6: avx2x1 xor() 15892 MB/s Oct 2 19:25:32.657113 kernel: raid6: sse2x4 gen() 10879 MB/s Oct 2 19:25:32.678122 kernel: raid6: sse2x4 xor() 6668 MB/s Oct 2 19:25:32.699123 kernel: raid6: sse2x2 gen() 11859 MB/s Oct 2 19:25:32.720125 kernel: raid6: sse2x2 xor() 7275 MB/s Oct 2 19:25:32.741124 kernel: raid6: sse2x1 gen() 10448 MB/s Oct 2 19:25:32.767557 kernel: raid6: sse2x1 xor() 5095 MB/s Oct 2 19:25:32.767660 kernel: raid6: using algorithm avx2x2 gen() 17878 MB/s Oct 2 19:25:32.767754 kernel: raid6: .... xor() 18471 MB/s, rmw enabled Oct 2 19:25:32.773162 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:25:32.801128 kernel: xor: automatically using best checksumming function avx Oct 2 19:25:32.913133 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:25:32.924869 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:25:32.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.924000 audit: BPF prog-id=7 op=LOAD Oct 2 19:25:32.924000 audit: BPF prog-id=8 op=LOAD Oct 2 19:25:32.926330 systemd[1]: Starting systemd-udevd.service... Oct 2 19:25:32.944612 systemd-udevd[389]: Using default interface naming scheme 'v252'. Oct 2 19:25:32.963462 systemd[1]: Started systemd-udevd.service. Oct 2 19:25:32.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:32.973560 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:25:32.989270 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation Oct 2 19:25:33.030792 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:25:33.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:33.032016 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:25:33.101027 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:25:33.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:33.192106 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:25:33.248110 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:25:33.248208 kernel: AES CTR mode by8 optimization enabled Oct 2 19:25:33.248231 kernel: scsi host0: Virtio SCSI HBA Oct 2 19:25:33.335136 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Oct 2 19:25:33.398200 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Oct 2 19:25:33.398595 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Oct 2 19:25:33.398826 kernel: sd 0:0:1:0: [sda] Write Protect is off Oct 2 19:25:33.412941 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Oct 2 19:25:33.413391 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:25:33.432565 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:25:33.432656 kernel: GPT:17805311 != 25165823 Oct 2 19:25:33.432679 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:25:33.438894 kernel: GPT:17805311 != 25165823 Oct 2 19:25:33.442676 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:25:33.447950 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:25:33.460645 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Oct 2 19:25:33.507275 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:25:33.524266 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (447) Oct 2 19:25:33.550829 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:25:33.572398 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:25:33.572661 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:25:33.616500 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:25:33.617821 systemd[1]: Starting disk-uuid.service... Oct 2 19:25:33.639580 disk-uuid[508]: Primary Header is updated. Oct 2 19:25:33.639580 disk-uuid[508]: Secondary Entries is updated. Oct 2 19:25:33.639580 disk-uuid[508]: Secondary Header is updated. Oct 2 19:25:33.680354 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:25:33.680395 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:25:34.692775 disk-uuid[509]: The operation has completed successfully. Oct 2 19:25:34.702261 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:25:34.768902 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:25:34.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:34.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:34.769043 systemd[1]: Finished disk-uuid.service. Oct 2 19:25:34.782786 systemd[1]: Starting verity-setup.service... Oct 2 19:25:34.814130 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:25:34.923458 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:25:34.932598 systemd[1]: Finished verity-setup.service. Oct 2 19:25:34.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:34.951620 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:25:35.068127 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:25:35.068256 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:25:35.068656 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:25:35.119273 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:25:35.119323 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:25:35.119365 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:25:35.069619 systemd[1]: Starting ignition-setup.service... Oct 2 19:25:35.141292 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:25:35.082700 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:25:35.153847 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:25:35.173788 systemd[1]: Finished ignition-setup.service. Oct 2 19:25:35.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.175584 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:25:35.210773 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:25:35.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.211000 audit: BPF prog-id=9 op=LOAD Oct 2 19:25:35.212956 systemd[1]: Starting systemd-networkd.service... Oct 2 19:25:35.246149 systemd-networkd[684]: lo: Link UP Oct 2 19:25:35.246160 systemd-networkd[684]: lo: Gained carrier Oct 2 19:25:35.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.246964 systemd-networkd[684]: Enumeration completed Oct 2 19:25:35.247384 systemd-networkd[684]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:25:35.247550 systemd[1]: Started systemd-networkd.service. Oct 2 19:25:35.249670 systemd-networkd[684]: eth0: Link UP Oct 2 19:25:35.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.249678 systemd-networkd[684]: eth0: Gained carrier Oct 2 19:25:35.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.347484 iscsid[689]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:25:35.347484 iscsid[689]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:25:35.347484 iscsid[689]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:25:35.347484 iscsid[689]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:25:35.347484 iscsid[689]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:25:35.347484 iscsid[689]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:25:35.347484 iscsid[689]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:25:35.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.254586 systemd[1]: Reached target network.target. Oct 2 19:25:35.260534 systemd-networkd[684]: eth0: DHCPv4 address 10.128.0.85/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:25:35.277404 systemd[1]: Starting iscsiuio.service... Oct 2 19:25:35.303499 systemd[1]: Started iscsiuio.service. Oct 2 19:25:35.318676 systemd[1]: Starting iscsid.service... Oct 2 19:25:35.537291 ignition[658]: Ignition 2.14.0 Oct 2 19:25:35.332411 systemd[1]: Started iscsid.service. Oct 2 19:25:35.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.537319 ignition[658]: Stage: fetch-offline Oct 2 19:25:35.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.341641 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:25:35.537422 ignition[658]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:35.363226 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:25:35.537464 ignition[658]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:35.418726 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:25:35.559969 ignition[658]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:35.434490 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:25:35.560273 ignition[658]: parsed url from cmdline: "" Oct 2 19:25:35.460426 systemd[1]: Reached target remote-fs.target. Oct 2 19:25:35.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.560284 ignition[658]: no config URL provided Oct 2 19:25:35.492390 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:25:35.560296 ignition[658]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:25:35.526818 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:25:35.560314 ignition[658]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:25:35.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.561911 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:25:35.560324 ignition[658]: failed to fetch config: resource requires networking Oct 2 19:25:35.574906 systemd[1]: Starting ignition-fetch.service... Oct 2 19:25:35.560625 ignition[658]: Ignition finished successfully Oct 2 19:25:35.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:35.632445 unknown[708]: fetched base config from "system" Oct 2 19:25:35.586584 ignition[708]: Ignition 2.14.0 Oct 2 19:25:35.632454 unknown[708]: fetched base config from "system" Oct 2 19:25:35.586595 ignition[708]: Stage: fetch Oct 2 19:25:35.632461 unknown[708]: fetched user config from "gcp" Oct 2 19:25:35.586723 ignition[708]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:35.635139 systemd[1]: Finished ignition-fetch.service. Oct 2 19:25:35.586753 ignition[708]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:35.650537 systemd[1]: Starting ignition-kargs.service... Oct 2 19:25:35.595592 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:35.689814 systemd[1]: Finished ignition-kargs.service. Oct 2 19:25:35.595788 ignition[708]: parsed url from cmdline: "" Oct 2 19:25:35.705647 systemd[1]: Starting ignition-disks.service... Oct 2 19:25:35.595794 ignition[708]: no config URL provided Oct 2 19:25:35.740727 systemd[1]: Finished ignition-disks.service. Oct 2 19:25:35.595810 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:25:35.756601 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:25:35.595822 ignition[708]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:25:35.776570 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:25:35.595860 ignition[708]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Oct 2 19:25:35.796397 systemd[1]: Reached target local-fs.target. Oct 2 19:25:35.601379 ignition[708]: GET result: OK Oct 2 19:25:35.803580 systemd[1]: Reached target sysinit.target. Oct 2 19:25:35.601456 ignition[708]: parsing config with SHA512: 85fd357d78acb3ee226c9b6f1aa0b391384c1a408dafbe173de0146761f4b59a0bdc66944668a5ecb1da3e2f55cfd343c0515b1c0e2992b5cbf5a64695cddd67 Oct 2 19:25:35.814475 systemd[1]: Reached target basic.target. Oct 2 19:25:35.633362 ignition[708]: fetch: fetch complete Oct 2 19:25:35.844961 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:25:35.633369 ignition[708]: fetch: fetch passed Oct 2 19:25:35.633423 ignition[708]: Ignition finished successfully Oct 2 19:25:35.664440 ignition[714]: Ignition 2.14.0 Oct 2 19:25:35.664451 ignition[714]: Stage: kargs Oct 2 19:25:35.664599 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:35.664630 ignition[714]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:35.672680 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:35.674155 ignition[714]: kargs: kargs passed Oct 2 19:25:35.674212 ignition[714]: Ignition finished successfully Oct 2 19:25:35.717819 ignition[720]: Ignition 2.14.0 Oct 2 19:25:35.717829 ignition[720]: Stage: disks Oct 2 19:25:35.717966 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:35.717999 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:35.726125 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:35.727724 ignition[720]: disks: disks passed Oct 2 19:25:35.727782 ignition[720]: Ignition finished successfully Oct 2 19:25:35.886724 systemd-fsck[728]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:25:36.055111 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:25:36.095370 kernel: kauditd_printk_skb: 22 callbacks suppressed Oct 2 19:25:36.095410 kernel: audit: type=1130 audit(1696274736.054:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.056664 systemd[1]: Mounting sysroot.mount... Oct 2 19:25:36.119300 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:25:36.113592 systemd[1]: Mounted sysroot.mount. Oct 2 19:25:36.126743 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:25:36.141834 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:25:36.156863 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:25:36.156927 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:25:36.156963 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:25:36.257303 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (734) Oct 2 19:25:36.257347 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:25:36.257370 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:25:36.257392 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:25:36.173856 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:25:36.198609 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:25:36.280273 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:25:36.280321 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:25:36.228682 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:25:36.291470 initrd-setup-root[763]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:25:36.314543 initrd-setup-root[771]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:25:36.306897 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:25:36.343298 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:25:36.357023 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:25:36.393431 kernel: audit: type=1130 audit(1696274736.356:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.358478 systemd[1]: Starting ignition-mount.service... Oct 2 19:25:36.402519 systemd[1]: Starting sysroot-boot.service... Oct 2 19:25:36.416483 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:25:36.416628 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:25:36.439604 ignition[799]: INFO : Ignition 2.14.0 Oct 2 19:25:36.439604 ignition[799]: INFO : Stage: mount Oct 2 19:25:36.439604 ignition[799]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:36.439604 ignition[799]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:36.494422 kernel: audit: type=1130 audit(1696274736.462:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.494670 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:36.494670 ignition[799]: INFO : mount: mount passed Oct 2 19:25:36.494670 ignition[799]: INFO : Ignition finished successfully Oct 2 19:25:36.573365 kernel: audit: type=1130 audit(1696274736.519:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:36.449295 systemd[1]: Finished ignition-mount.service. Oct 2 19:25:36.465943 systemd[1]: Finished sysroot-boot.service. Oct 2 19:25:36.623260 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (809) Oct 2 19:25:36.623298 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:25:36.623324 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:25:36.623339 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:25:36.522000 systemd[1]: Starting ignition-files.service... Oct 2 19:25:36.637273 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:25:36.568709 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:25:36.639739 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:25:36.669439 ignition[828]: INFO : Ignition 2.14.0 Oct 2 19:25:36.669439 ignition[828]: INFO : Stage: files Oct 2 19:25:36.685255 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:36.685255 ignition[828]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:36.685255 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:36.685255 ignition[828]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:25:36.751265 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (830) Oct 2 19:25:36.751301 ignition[828]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:25:36.751301 ignition[828]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:25:36.751301 ignition[828]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:25:36.751301 ignition[828]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:25:36.751301 ignition[828]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem765625636" Oct 2 19:25:36.751301 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem765625636": device or resource busy Oct 2 19:25:36.751301 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem765625636", trying btrfs: device or resource busy Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem765625636" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem765625636" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem765625636" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem765625636" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:25:36.751301 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:25:36.700186 unknown[828]: wrote ssh authorized keys file for user: core Oct 2 19:25:37.026272 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:25:37.142104 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:25:37.166270 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:25:37.166270 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:25:37.166270 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:25:37.278309 systemd-networkd[684]: eth0: Gained IPv6LL Oct 2 19:25:37.291711 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Oct 2 19:25:37.395140 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem492938795" Oct 2 19:25:37.419266 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem492938795": device or resource busy Oct 2 19:25:37.419266 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem492938795", trying btrfs: device or resource busy Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem492938795" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem492938795" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem492938795" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem492938795" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:25:37.419266 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:25:37.411134 systemd[1]: mnt-oem492938795.mount: Deactivated successfully. Oct 2 19:25:37.651276 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Oct 2 19:25:37.768209 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Oct 2 19:25:37.793264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:25:37.793264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:25:37.793264 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:25:37.848288 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Oct 2 19:25:38.529467 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Oct 2 19:25:38.554261 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:25:38.554261 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:25:38.554261 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:25:38.603263 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Oct 2 19:25:38.899312 ignition[828]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Oct 2 19:25:38.899312 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2564230052" Oct 2 19:25:38.938243 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2564230052": device or resource busy Oct 2 19:25:38.938243 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2564230052", trying btrfs: device or resource busy Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2564230052" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2564230052" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2564230052" Oct 2 19:25:38.938243 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2564230052" Oct 2 19:25:39.341559 kernel: audit: type=1130 audit(1696274739.003:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.341597 kernel: audit: type=1130 audit(1696274739.085:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.341614 kernel: audit: type=1130 audit(1696274739.158:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.341628 kernel: audit: type=1131 audit(1696274739.158:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.341647 kernel: audit: type=1130 audit(1696274739.281:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.341661 kernel: audit: type=1131 audit(1696274739.281:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:38.917741 systemd[1]: mnt-oem2564230052.mount: Deactivated successfully. Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2567925373" Oct 2 19:25:39.376628 ignition[828]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2567925373": device or resource busy Oct 2 19:25:39.376628 ignition[828]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2567925373", trying btrfs: device or resource busy Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2567925373" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2567925373" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem2567925373" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem2567925373" Oct 2 19:25:39.376628 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:25:39.376628 ignition[828]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:25:39.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:38.942365 systemd[1]: mnt-oem2567925373.mount: Deactivated successfully. Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(1e): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(1e): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(20): [started] processing unit "prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(20): op(21): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(20): op(21): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(20): [finished] processing unit "prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(23): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(23): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(24): [started] setting preset to enabled for "oem-gce.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(24): [finished] setting preset to enabled for "oem-gce.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(25): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(25): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(26): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: op(26): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:25:39.729383 ignition[828]: INFO : files: createResultFile: createFiles: op(27): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:25:38.957867 systemd[1]: Finished ignition-files.service. Oct 2 19:25:40.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.055415 ignition[828]: INFO : files: createResultFile: createFiles: op(27): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:25:40.055415 ignition[828]: INFO : files: files passed Oct 2 19:25:40.055415 ignition[828]: INFO : Ignition finished successfully Oct 2 19:25:40.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.102389 initrd-setup-root-after-ignition[851]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:25:40.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.015560 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:25:40.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.049316 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:25:39.050657 systemd[1]: Starting ignition-quench.service... Oct 2 19:25:40.176517 iscsid[689]: iscsid shutting down. Oct 2 19:25:39.065837 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:25:39.086934 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:25:39.087096 systemd[1]: Finished ignition-quench.service. Oct 2 19:25:40.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.159706 systemd[1]: Reached target ignition-complete.target. Oct 2 19:25:40.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.248381 ignition[866]: INFO : Ignition 2.14.0 Oct 2 19:25:40.248381 ignition[866]: INFO : Stage: umount Oct 2 19:25:40.248381 ignition[866]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:25:40.248381 ignition[866]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:25:40.248381 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:25:40.248381 ignition[866]: INFO : umount: umount passed Oct 2 19:25:40.248381 ignition[866]: INFO : Ignition finished successfully Oct 2 19:25:40.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.230423 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:25:40.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.266561 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:25:40.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.266696 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:25:40.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.282756 systemd[1]: Reached target initrd-fs.target. Oct 2 19:25:39.376340 systemd[1]: Reached target initrd.target. Oct 2 19:25:39.391509 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:25:39.392898 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:25:39.447760 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:25:39.510699 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:25:39.542586 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:25:40.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.559595 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:25:40.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.583553 systemd[1]: Stopped target timers.target. Oct 2 19:25:39.607532 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:25:40.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.607726 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:25:39.625817 systemd[1]: Stopped target initrd.target. Oct 2 19:25:40.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.643671 systemd[1]: Stopped target basic.target. Oct 2 19:25:39.688644 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:25:39.720598 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:25:39.737741 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:25:39.792604 systemd[1]: Stopped target remote-fs.target. Oct 2 19:25:40.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.838673 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:25:40.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.643000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:25:39.885587 systemd[1]: Stopped target sysinit.target. Oct 2 19:25:39.929572 systemd[1]: Stopped target local-fs.target. Oct 2 19:25:39.972683 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:25:40.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:39.986643 systemd[1]: Stopped target swap.target. Oct 2 19:25:40.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.024578 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:25:40.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.024786 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:25:40.048715 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:25:40.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.064438 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:25:40.064701 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:25:40.093751 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:25:40.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.093934 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:25:40.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.112770 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:25:40.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.113011 systemd[1]: Stopped ignition-files.service. Oct 2 19:25:40.136252 systemd[1]: Stopping ignition-mount.service... Oct 2 19:25:40.169693 systemd[1]: Stopping iscsid.service... Oct 2 19:25:40.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.184837 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:25:40.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.206283 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:25:40.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.206713 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:25:40.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.223777 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:25:40.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:40.223959 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:25:40.243946 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:25:40.245026 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:25:40.245175 systemd[1]: Stopped iscsid.service. Oct 2 19:25:40.257289 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:25:40.257403 systemd[1]: Stopped ignition-mount.service. Oct 2 19:25:40.265147 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:25:40.265272 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:25:41.048307 systemd-journald[188]: Received SIGTERM from PID 1 (n/a). Oct 2 19:25:40.295240 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:25:40.295398 systemd[1]: Stopped ignition-disks.service. Oct 2 19:25:40.316599 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:25:40.316678 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:25:40.354512 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:25:40.354581 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:25:40.372703 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:25:40.372792 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:25:40.390644 systemd[1]: Stopped target paths.target. Oct 2 19:25:40.406412 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:25:40.410258 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:25:40.414484 systemd[1]: Stopped target slices.target. Oct 2 19:25:40.448284 systemd[1]: Stopped target sockets.target. Oct 2 19:25:40.462530 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:25:40.462592 systemd[1]: Closed iscsid.socket. Oct 2 19:25:40.469617 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:25:40.469689 systemd[1]: Stopped ignition-setup.service. Oct 2 19:25:40.491575 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:25:40.491649 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:25:40.498790 systemd[1]: Stopping iscsiuio.service... Oct 2 19:25:40.520879 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:25:40.521007 systemd[1]: Stopped iscsiuio.service. Oct 2 19:25:40.528963 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:25:40.529072 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:25:40.559587 systemd[1]: Stopped target network.target. Oct 2 19:25:40.574523 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:25:40.574596 systemd[1]: Closed iscsiuio.socket. Oct 2 19:25:40.581866 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:25:40.585220 systemd-networkd[684]: eth0: DHCPv6 lease lost Oct 2 19:25:40.601624 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:25:40.618717 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:25:40.618851 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:25:40.636845 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:25:40.636977 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:25:40.643867 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:25:40.643916 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:25:40.666352 systemd[1]: Stopping network-cleanup.service... Oct 2 19:25:40.679266 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:25:40.679487 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:25:40.695546 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:25:40.695620 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:25:40.711644 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:25:40.711711 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:25:40.727861 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:25:40.744923 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:25:40.745673 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:25:40.745825 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:25:40.753139 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:25:40.753236 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:25:40.774418 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:25:40.774495 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:25:40.792316 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:25:40.792413 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:25:40.808520 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:25:40.808614 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:25:40.827433 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:25:40.827506 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:25:40.846641 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:25:40.870327 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:25:40.870461 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:25:40.884539 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:25:40.884606 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:25:40.899389 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:25:40.899482 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:25:40.916714 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:25:40.917421 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:25:40.917538 systemd[1]: Stopped network-cleanup.service. Oct 2 19:25:40.935757 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:25:40.935870 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:25:40.953698 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:25:40.973398 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:25:41.012165 systemd[1]: Switching root. Oct 2 19:25:41.051536 systemd-journald[188]: Journal stopped Oct 2 19:25:46.059736 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:25:46.059835 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:25:46.059853 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:25:46.059867 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:25:46.059889 kernel: SELinux: policy capability open_perms=1 Oct 2 19:25:46.059903 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:25:46.059922 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:25:46.059937 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:25:46.059951 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:25:46.059965 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:25:46.059979 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:25:46.059996 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:25:46.060017 kernel: audit: type=1403 audit(1696274741.396:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:25:46.060040 systemd[1]: Successfully loaded SELinux policy in 118.380ms. Oct 2 19:25:46.060283 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.209ms. Oct 2 19:25:46.060320 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:25:46.060346 systemd[1]: Detected virtualization kvm. Oct 2 19:25:46.060370 systemd[1]: Detected architecture x86-64. Oct 2 19:25:46.060398 systemd[1]: Detected first boot. Oct 2 19:25:46.060424 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:25:46.060450 kernel: audit: type=1400 audit(1696274741.576:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:46.060476 kernel: audit: type=1400 audit(1696274741.576:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:46.060510 kernel: audit: type=1334 audit(1696274741.596:83): prog-id=10 op=LOAD Oct 2 19:25:46.060532 kernel: audit: type=1334 audit(1696274741.596:84): prog-id=10 op=UNLOAD Oct 2 19:25:46.060554 kernel: audit: type=1334 audit(1696274741.619:85): prog-id=11 op=LOAD Oct 2 19:25:46.060578 kernel: audit: type=1334 audit(1696274741.619:86): prog-id=11 op=UNLOAD Oct 2 19:25:46.060600 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:25:46.060632 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:25:46.060799 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:25:46.060829 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:25:46.060860 kernel: audit: type=1334 audit(1696274745.181:87): prog-id=12 op=LOAD Oct 2 19:25:46.060883 kernel: audit: type=1334 audit(1696274745.181:88): prog-id=3 op=UNLOAD Oct 2 19:25:46.060907 kernel: audit: type=1334 audit(1696274745.188:89): prog-id=13 op=LOAD Oct 2 19:25:46.060931 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:25:46.060955 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:25:46.060979 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:25:46.061006 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:25:46.061030 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:25:46.061060 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:25:46.061106 systemd[1]: Created slice system-getty.slice. Oct 2 19:25:46.061131 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:25:46.061155 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:25:46.061188 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:25:46.061214 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:25:46.061237 systemd[1]: Created slice user.slice. Oct 2 19:25:46.061267 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:25:46.061298 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:25:46.061323 systemd[1]: Set up automount boot.automount. Oct 2 19:25:46.061346 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:25:46.061379 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:25:46.061404 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:25:46.061430 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:25:46.061455 systemd[1]: Reached target integritysetup.target. Oct 2 19:25:46.061480 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:25:46.061505 systemd[1]: Reached target remote-fs.target. Oct 2 19:25:46.061534 systemd[1]: Reached target slices.target. Oct 2 19:25:46.061558 systemd[1]: Reached target swap.target. Oct 2 19:25:46.061582 systemd[1]: Reached target torcx.target. Oct 2 19:25:46.061606 systemd[1]: Reached target veritysetup.target. Oct 2 19:25:46.061630 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:25:46.061665 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:25:46.061691 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:25:46.061717 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:25:46.061741 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:25:46.061772 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:25:46.061796 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:25:46.061820 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:25:46.061843 systemd[1]: Mounting media.mount... Oct 2 19:25:46.061868 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:25:46.061892 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:25:46.061921 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:25:46.061944 systemd[1]: Mounting tmp.mount... Oct 2 19:25:46.061969 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:25:46.061998 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:25:46.062022 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:25:46.062046 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:25:46.062070 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:25:46.062195 systemd[1]: Starting modprobe@drm.service... Oct 2 19:25:46.062223 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:25:46.062247 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:25:46.062271 systemd[1]: Starting modprobe@loop.service... Oct 2 19:25:46.062294 kernel: fuse: init (API version 7.34) Oct 2 19:25:46.062323 kernel: loop: module loaded Oct 2 19:25:46.062347 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:25:46.062517 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:25:46.062543 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:25:46.062565 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:25:46.062588 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:25:46.062610 systemd[1]: Stopped systemd-journald.service. Oct 2 19:25:46.062633 systemd[1]: Starting systemd-journald.service... Oct 2 19:25:46.062665 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:25:46.062696 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:25:46.062728 systemd-journald[990]: Journal started Oct 2 19:25:46.062835 systemd-journald[990]: Runtime Journal (/run/log/journal/859957698657b854b5366128085c41b4) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:25:41.051000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:25:41.396000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:25:41.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:41.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:25:41.596000 audit: BPF prog-id=10 op=LOAD Oct 2 19:25:41.596000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:25:41.619000 audit: BPF prog-id=11 op=LOAD Oct 2 19:25:41.619000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:25:45.181000 audit: BPF prog-id=12 op=LOAD Oct 2 19:25:45.181000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:25:45.188000 audit: BPF prog-id=13 op=LOAD Oct 2 19:25:45.202000 audit: BPF prog-id=14 op=LOAD Oct 2 19:25:45.202000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:25:45.202000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:25:45.203000 audit: BPF prog-id=15 op=LOAD Oct 2 19:25:45.203000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:25:45.203000 audit: BPF prog-id=16 op=LOAD Oct 2 19:25:45.204000 audit: BPF prog-id=17 op=LOAD Oct 2 19:25:45.204000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:25:45.204000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:25:45.205000 audit: BPF prog-id=18 op=LOAD Oct 2 19:25:45.205000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:25:45.205000 audit: BPF prog-id=19 op=LOAD Oct 2 19:25:45.205000 audit: BPF prog-id=20 op=LOAD Oct 2 19:25:45.205000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:25:45.205000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:25:45.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.222000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:25:45.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:45.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.014000 audit: BPF prog-id=21 op=LOAD Oct 2 19:25:46.014000 audit: BPF prog-id=22 op=LOAD Oct 2 19:25:46.014000 audit: BPF prog-id=23 op=LOAD Oct 2 19:25:46.015000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:25:46.015000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:25:46.056000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:25:46.056000 audit[990]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd3030c4e0 a2=4000 a3=7ffd3030c57c items=0 ppid=1 pid=990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:46.056000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:25:41.856036 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:25:45.180296 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:25:41.858764 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:25:45.207431 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:25:41.858791 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:25:41.858836 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:25:41.858851 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:25:41.858897 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:25:41.858913 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:25:41.859168 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:25:41.859214 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:25:41.859230 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:25:41.860412 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:25:41.860456 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:25:41.860479 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:25:41.860498 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:25:41.860519 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:25:41.860536 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:41Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:25:44.511316 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:44.511646 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:44.511798 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:44.512028 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:25:44.512120 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:25:44.512208 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2023-10-02T19:25:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:25:46.076129 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:25:46.092140 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:25:46.105110 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:25:46.111117 systemd[1]: Stopped verity-setup.service. Oct 2 19:25:46.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.131097 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:25:46.141137 systemd[1]: Started systemd-journald.service. Oct 2 19:25:46.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.150873 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:25:46.158519 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:25:46.166489 systemd[1]: Mounted media.mount. Oct 2 19:25:46.173448 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:25:46.183459 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:25:46.192498 systemd[1]: Mounted tmp.mount. Oct 2 19:25:46.200591 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:25:46.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.210775 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:25:46.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.219687 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:25:46.219983 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:25:46.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.228814 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:25:46.229053 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:25:46.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.238754 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:25:46.238969 systemd[1]: Finished modprobe@drm.service. Oct 2 19:25:46.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.245511 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:25:46.245737 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:25:46.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.255964 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:25:46.256208 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:25:46.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.265718 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:25:46.265932 systemd[1]: Finished modprobe@loop.service. Oct 2 19:25:46.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.274776 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:25:46.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.283712 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:25:46.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.292772 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:25:46.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.301703 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:25:46.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.312062 systemd[1]: Reached target network-pre.target. Oct 2 19:25:46.321938 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:25:46.331869 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:25:46.339284 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:25:46.342845 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:25:46.352153 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:25:46.361291 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:25:46.363135 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:25:46.370297 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:25:46.372228 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:25:46.378419 systemd-journald[990]: Time spent on flushing to /var/log/journal/859957698657b854b5366128085c41b4 is 112.058ms for 1167 entries. Oct 2 19:25:46.378419 systemd-journald[990]: System Journal (/var/log/journal/859957698657b854b5366128085c41b4) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:25:46.535363 systemd-journald[990]: Received client request to flush runtime journal. Oct 2 19:25:46.535446 kernel: kauditd_printk_skb: 51 callbacks suppressed Oct 2 19:25:46.535481 kernel: audit: type=1130 audit(1696274746.434:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.535514 kernel: audit: type=1130 audit(1696274746.471:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.535545 kernel: audit: type=1130 audit(1696274746.521:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.389196 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:25:46.398142 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:25:46.408640 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:25:46.536349 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:25:46.417441 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:25:46.426621 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:25:46.435716 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:25:46.476052 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:25:46.513674 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:25:46.524203 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:25:46.557053 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:25:46.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.590580 kernel: audit: type=1130 audit(1696274746.564:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.641460 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:25:46.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:46.675119 kernel: audit: type=1130 audit(1696274746.649:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.167806 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:25:47.199112 kernel: audit: type=1130 audit(1696274747.175:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.208878 kernel: audit: type=1334 audit(1696274747.198:145): prog-id=24 op=LOAD Oct 2 19:25:47.209048 kernel: audit: type=1334 audit(1696274747.198:146): prog-id=25 op=LOAD Oct 2 19:25:47.198000 audit: BPF prog-id=24 op=LOAD Oct 2 19:25:47.198000 audit: BPF prog-id=25 op=LOAD Oct 2 19:25:47.206835 systemd[1]: Starting systemd-udevd.service... Oct 2 19:25:47.198000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:25:47.224025 kernel: audit: type=1334 audit(1696274747.198:147): prog-id=7 op=UNLOAD Oct 2 19:25:47.224131 kernel: audit: type=1334 audit(1696274747.198:148): prog-id=8 op=UNLOAD Oct 2 19:25:47.198000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:25:47.253814 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Oct 2 19:25:47.312974 systemd[1]: Started systemd-udevd.service. Oct 2 19:25:47.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.322000 audit: BPF prog-id=26 op=LOAD Oct 2 19:25:47.324606 systemd[1]: Starting systemd-networkd.service... Oct 2 19:25:47.336000 audit: BPF prog-id=27 op=LOAD Oct 2 19:25:47.337000 audit: BPF prog-id=28 op=LOAD Oct 2 19:25:47.337000 audit: BPF prog-id=29 op=LOAD Oct 2 19:25:47.339445 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:25:47.406139 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:25:47.417851 systemd[1]: Started systemd-userdbd.service. Oct 2 19:25:47.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.574113 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:25:47.581332 systemd-networkd[1022]: lo: Link UP Oct 2 19:25:47.581734 systemd-networkd[1022]: lo: Gained carrier Oct 2 19:25:47.582681 systemd-networkd[1022]: Enumeration completed Oct 2 19:25:47.582976 systemd[1]: Started systemd-networkd.service. Oct 2 19:25:47.582997 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:25:47.587059 systemd-networkd[1022]: eth0: Link UP Oct 2 19:25:47.587297 systemd-networkd[1022]: eth0: Gained carrier Oct 2 19:25:47.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.599289 systemd-networkd[1022]: eth0: DHCPv4 address 10.128.0.85/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:25:47.583000 audit[1014]: AVC avc: denied { confidentiality } for pid=1014 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:25:47.583000 audit[1014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555b8e033020 a1=32194 a2=7f3caa2d4bc5 a3=5 items=106 ppid=1009 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:47.583000 audit: CWD cwd="/" Oct 2 19:25:47.583000 audit: PATH item=0 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=1 name=(null) inode=13251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=2 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=3 name=(null) inode=13252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=4 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=5 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=6 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=7 name=(null) inode=13254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=8 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=9 name=(null) inode=13255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=10 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=11 name=(null) inode=13256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=12 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=13 name=(null) inode=13257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=14 name=(null) inode=13253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=15 name=(null) inode=13258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=16 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=17 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=18 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=19 name=(null) inode=13260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=20 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=21 name=(null) inode=13261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=22 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=23 name=(null) inode=13262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=24 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=25 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=26 name=(null) inode=13259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=27 name=(null) inode=13264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=28 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=29 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=30 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=31 name=(null) inode=13266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=32 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=33 name=(null) inode=13267 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=34 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=35 name=(null) inode=13268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=36 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=37 name=(null) inode=13269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=38 name=(null) inode=13265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=39 name=(null) inode=13270 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=40 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=41 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=42 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=43 name=(null) inode=13272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=44 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=45 name=(null) inode=13273 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=46 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=47 name=(null) inode=13274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=48 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=49 name=(null) inode=13275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=50 name=(null) inode=13271 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=51 name=(null) inode=13276 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=52 name=(null) inode=41 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=53 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=54 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=55 name=(null) inode=13278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=56 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=57 name=(null) inode=13279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=58 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=59 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=60 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=61 name=(null) inode=13281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=62 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=63 name=(null) inode=13282 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=64 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=65 name=(null) inode=13283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=66 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=67 name=(null) inode=13284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=68 name=(null) inode=13280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=69 name=(null) inode=13285 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=70 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=71 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=72 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=73 name=(null) inode=13287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=74 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=75 name=(null) inode=13288 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=76 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=77 name=(null) inode=13289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=78 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=79 name=(null) inode=13290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=80 name=(null) inode=13286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=81 name=(null) inode=13291 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=82 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=83 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=84 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=85 name=(null) inode=13293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=86 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=87 name=(null) inode=13294 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=88 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=89 name=(null) inode=13295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=90 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=91 name=(null) inode=13296 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=92 name=(null) inode=13292 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=93 name=(null) inode=13297 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=94 name=(null) inode=13277 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=95 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=96 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=97 name=(null) inode=13299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=98 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=99 name=(null) inode=13300 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=100 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=101 name=(null) inode=13301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=102 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=103 name=(null) inode=13302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=104 name=(null) inode=13298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PATH item=105 name=(null) inode=13303 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:25:47.583000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:25:47.641189 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Oct 2 19:25:47.670115 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:25:47.694104 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1024) Oct 2 19:25:47.704281 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:25:47.714131 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:25:47.736107 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:25:47.746139 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:25:47.755160 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:25:47.762876 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:25:47.792686 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:25:47.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.804069 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:25:47.836652 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:25:47.870513 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:25:47.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.879512 systemd[1]: Reached target cryptsetup.target. Oct 2 19:25:47.890137 systemd[1]: Starting lvm2-activation.service... Oct 2 19:25:47.897698 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:25:47.926677 systemd[1]: Finished lvm2-activation.service. Oct 2 19:25:47.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:47.937479 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:25:47.946308 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:25:47.946367 systemd[1]: Reached target local-fs.target. Oct 2 19:25:47.955277 systemd[1]: Reached target machines.target. Oct 2 19:25:47.965958 systemd[1]: Starting ldconfig.service... Oct 2 19:25:47.974956 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:25:47.975062 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:47.977154 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:25:47.986247 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:25:47.999099 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:25:48.000240 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:25:48.000365 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:25:48.002191 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:25:48.002958 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Oct 2 19:25:48.005203 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:25:48.031603 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:25:48.039831 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:25:48.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.044411 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:25:48.050256 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:25:48.216828 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Oct 2 19:25:48.216828 systemd-fsck[1059]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:25:48.218555 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:25:48.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.231682 systemd[1]: Mounting boot.mount... Oct 2 19:25:48.255809 systemd[1]: Mounted boot.mount. Oct 2 19:25:48.297747 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:25:48.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.428229 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:25:48.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.438286 systemd[1]: Starting audit-rules.service... Oct 2 19:25:48.447387 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:25:48.459088 systemd[1]: Starting oem-gce-enable-oslogin.service... Oct 2 19:25:48.471052 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:25:48.479000 audit: BPF prog-id=30 op=LOAD Oct 2 19:25:48.482110 systemd[1]: Starting systemd-resolved.service... Oct 2 19:25:48.489000 audit: BPF prog-id=31 op=LOAD Oct 2 19:25:48.492405 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:25:48.502287 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:25:48.540330 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:25:48.542000 audit[1070]: SYSTEM_BOOT pid=1070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.553230 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:25:48.556752 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:25:48.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.621784 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Oct 2 19:25:48.622035 systemd[1]: Finished oem-gce-enable-oslogin.service. Oct 2 19:25:48.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.731946 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:25:48.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:25:48.746840 augenrules[1092]: No rules Oct 2 19:25:48.745000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:25:48.745000 audit[1092]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff16753c40 a2=420 a3=0 items=0 ppid=1062 pid=1092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:25:48.745000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:25:48.747450 systemd[1]: Finished audit-rules.service. Oct 2 19:25:48.750383 systemd-timesyncd[1069]: Contacted time server 169.254.169.254:123 (169.254.169.254). Oct 2 19:25:48.750469 systemd-timesyncd[1069]: Initial clock synchronization to Mon 2023-10-02 19:25:49.076869 UTC. Oct 2 19:25:48.751327 systemd-resolved[1068]: Positive Trust Anchors: Oct 2 19:25:48.751687 systemd-resolved[1068]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:25:48.751844 systemd-resolved[1068]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:25:48.755411 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:25:48.764739 systemd[1]: Reached target time-set.target. Oct 2 19:25:48.798663 systemd-resolved[1068]: Defaulting to hostname 'linux'. Oct 2 19:25:48.802635 systemd[1]: Started systemd-resolved.service. Oct 2 19:25:48.811395 systemd[1]: Reached target network.target. Oct 2 19:25:48.820242 systemd[1]: Reached target nss-lookup.target. Oct 2 19:25:49.048809 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:25:49.062288 systemd[1]: Finished ldconfig.service. Oct 2 19:25:49.072334 systemd[1]: Starting systemd-update-done.service... Oct 2 19:25:49.081612 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:25:49.082837 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:25:49.092844 systemd[1]: Finished systemd-update-done.service. Oct 2 19:25:49.101649 systemd[1]: Reached target sysinit.target. Oct 2 19:25:49.110461 systemd[1]: Started motdgen.path. Oct 2 19:25:49.118460 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:25:49.128705 systemd[1]: Started logrotate.timer. Oct 2 19:25:49.136634 systemd[1]: Started mdadm.timer. Oct 2 19:25:49.144440 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:25:49.153418 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:25:49.153482 systemd[1]: Reached target paths.target. Oct 2 19:25:49.161409 systemd[1]: Reached target timers.target. Oct 2 19:25:49.170602 systemd[1]: Listening on dbus.socket. Oct 2 19:25:49.179926 systemd[1]: Starting docker.socket... Oct 2 19:25:49.191623 systemd[1]: Listening on sshd.socket. Oct 2 19:25:49.200455 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:49.201341 systemd[1]: Listening on docker.socket. Oct 2 19:25:49.208463 systemd[1]: Reached target sockets.target. Oct 2 19:25:49.217322 systemd[1]: Reached target basic.target. Oct 2 19:25:49.225484 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:25:49.225533 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:25:49.227345 systemd[1]: Starting containerd.service... Oct 2 19:25:49.235955 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:25:49.247389 systemd-networkd[1022]: eth0: Gained IPv6LL Oct 2 19:25:49.249251 systemd[1]: Starting dbus.service... Oct 2 19:25:49.259130 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:25:49.268328 systemd[1]: Starting extend-filesystems.service... Oct 2 19:25:49.278355 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:25:49.280576 systemd[1]: Starting motdgen.service... Oct 2 19:25:49.289616 systemd[1]: Starting oem-gce.service... Oct 2 19:25:49.300909 jq[1104]: false Oct 2 19:25:49.301335 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:25:49.310292 systemd[1]: Starting prepare-critools.service... Oct 2 19:25:49.320408 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:25:49.331347 systemd[1]: Starting sshd-keygen.service... Oct 2 19:25:49.346346 systemd[1]: Starting systemd-logind.service... Oct 2 19:25:49.354311 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:25:49.354446 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Oct 2 19:25:49.355370 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:25:49.356746 systemd[1]: Starting update-engine.service... Oct 2 19:25:49.365479 extend-filesystems[1105]: Found sda Oct 2 19:25:49.366378 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:25:49.375944 jq[1127]: true Oct 2 19:25:49.385336 extend-filesystems[1105]: Found sda1 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda2 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda3 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found usr Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda4 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda6 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda7 Oct 2 19:25:49.393840 extend-filesystems[1105]: Found sda9 Oct 2 19:25:49.393840 extend-filesystems[1105]: Checking size of /dev/sda9 Oct 2 19:25:49.388726 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:25:49.507491 extend-filesystems[1105]: Resized partition /dev/sda9 Oct 2 19:25:49.389034 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:25:49.516915 extend-filesystems[1149]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:25:49.389643 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:25:49.527012 tar[1133]: ./ Oct 2 19:25:49.527012 tar[1133]: ./macvlan Oct 2 19:25:49.389914 systemd[1]: Finished motdgen.service. Oct 2 19:25:49.429364 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:25:49.429698 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:25:49.532452 mkfs.ext4[1139]: mke2fs 1.46.5 (30-Dec-2021) Oct 2 19:25:49.532452 mkfs.ext4[1139]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Oct 2 19:25:49.532452 mkfs.ext4[1139]: Creating filesystem with 262144 4k blocks and 65536 inodes Oct 2 19:25:49.532452 mkfs.ext4[1139]: Filesystem UUID: fa07c361-4071-48e4-a713-42f07815ba60 Oct 2 19:25:49.532452 mkfs.ext4[1139]: Superblock backups stored on blocks: Oct 2 19:25:49.532452 mkfs.ext4[1139]: 32768, 98304, 163840, 229376 Oct 2 19:25:49.532452 mkfs.ext4[1139]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:25:49.532452 mkfs.ext4[1139]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:25:49.532452 mkfs.ext4[1139]: Creating journal (8192 blocks): done Oct 2 19:25:49.532452 mkfs.ext4[1139]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:25:49.534183 jq[1137]: true Oct 2 19:25:49.542109 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Oct 2 19:25:49.556173 update_engine[1124]: I1002 19:25:49.555702 1124 main.cc:92] Flatcar Update Engine starting Oct 2 19:25:49.564513 dbus-daemon[1103]: [system] SELinux support is enabled Oct 2 19:25:49.565358 systemd[1]: Started dbus.service. Oct 2 19:25:49.569248 umount[1150]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Oct 2 19:25:49.577105 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Oct 2 19:25:49.614909 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:25:49.615002 tar[1134]: crictl Oct 2 19:25:49.615402 update_engine[1124]: I1002 19:25:49.602314 1124 update_check_scheduler.cc:74] Next update check in 2m46s Oct 2 19:25:49.594587 dbus-daemon[1103]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1022 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:25:49.583059 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:25:49.610582 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:25:49.583172 systemd[1]: Reached target system-config.target. Oct 2 19:25:49.593387 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:25:49.593422 systemd[1]: Reached target user-config.target. Oct 2 19:25:49.609874 systemd[1]: Started update-engine.service. Oct 2 19:25:49.630006 systemd[1]: Started locksmithd.service. Oct 2 19:25:49.640641 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:25:49.673210 extend-filesystems[1149]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 19:25:49.673210 extend-filesystems[1149]: old_desc_blocks = 1, new_desc_blocks = 2 Oct 2 19:25:49.673210 extend-filesystems[1149]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Oct 2 19:25:49.723304 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:25:49.723371 extend-filesystems[1105]: Resized filesystem in /dev/sda9 Oct 2 19:25:49.674605 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:25:49.675028 systemd[1]: Finished extend-filesystems.service. Oct 2 19:25:49.736000 tar[1133]: ./static Oct 2 19:25:49.737815 bash[1171]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:25:49.739684 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:25:49.778960 env[1138]: time="2023-10-02T19:25:49.778883597Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:25:49.779426 tar[1133]: ./vlan Oct 2 19:25:49.841204 tar[1133]: ./portmap Oct 2 19:25:49.892547 systemd-logind[1123]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:25:49.893199 tar[1133]: ./host-local Oct 2 19:25:49.905636 systemd-logind[1123]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:25:49.905880 systemd-logind[1123]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:25:49.906271 systemd-logind[1123]: New seat seat0. Oct 2 19:25:49.921242 systemd[1]: Started systemd-logind.service. Oct 2 19:25:49.984637 coreos-metadata[1102]: Oct 02 19:25:49.984 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Oct 2 19:25:49.990907 tar[1133]: ./vrf Oct 2 19:25:49.992383 coreos-metadata[1102]: Oct 02 19:25:49.992 INFO Fetch failed with 404: resource not found Oct 2 19:25:49.992622 coreos-metadata[1102]: Oct 02 19:25:49.992 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Oct 2 19:25:49.996770 coreos-metadata[1102]: Oct 02 19:25:49.996 INFO Fetch successful Oct 2 19:25:49.997019 coreos-metadata[1102]: Oct 02 19:25:49.996 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Oct 2 19:25:49.998335 coreos-metadata[1102]: Oct 02 19:25:49.998 INFO Fetch failed with 404: resource not found Oct 2 19:25:49.998585 coreos-metadata[1102]: Oct 02 19:25:49.998 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Oct 2 19:25:50.000314 coreos-metadata[1102]: Oct 02 19:25:50.000 INFO Fetch failed with 404: resource not found Oct 2 19:25:50.000546 coreos-metadata[1102]: Oct 02 19:25:50.000 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Oct 2 19:25:50.005784 coreos-metadata[1102]: Oct 02 19:25:50.005 INFO Fetch successful Oct 2 19:25:50.010890 unknown[1102]: wrote ssh authorized keys file for user: core Oct 2 19:25:50.054187 update-ssh-keys[1179]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:25:50.057670 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:25:50.114857 env[1138]: time="2023-10-02T19:25:50.114733300Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:25:50.115385 env[1138]: time="2023-10-02T19:25:50.115349771Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.122087 env[1138]: time="2023-10-02T19:25:50.122015568Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:50.134719 env[1138]: time="2023-10-02T19:25:50.134657485Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.135449 env[1138]: time="2023-10-02T19:25:50.135407651Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:50.135648 env[1138]: time="2023-10-02T19:25:50.135624256Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.135783 env[1138]: time="2023-10-02T19:25:50.135761042Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:25:50.135910 env[1138]: time="2023-10-02T19:25:50.135890833Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.136198 env[1138]: time="2023-10-02T19:25:50.136155797Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.136771 env[1138]: time="2023-10-02T19:25:50.136745431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:25:50.137240 env[1138]: time="2023-10-02T19:25:50.137208538Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:25:50.137385 env[1138]: time="2023-10-02T19:25:50.137364304Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:25:50.137591 env[1138]: time="2023-10-02T19:25:50.137569357Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:25:50.137718 env[1138]: time="2023-10-02T19:25:50.137698894Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:25:50.151254 env[1138]: time="2023-10-02T19:25:50.151180201Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:25:50.151538 env[1138]: time="2023-10-02T19:25:50.151483094Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:25:50.151657 env[1138]: time="2023-10-02T19:25:50.151636504Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:25:50.151942 env[1138]: time="2023-10-02T19:25:50.151814890Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.153760 env[1138]: time="2023-10-02T19:25:50.153699935Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.153954 env[1138]: time="2023-10-02T19:25:50.153930457Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154123 env[1138]: time="2023-10-02T19:25:50.154074411Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154258 env[1138]: time="2023-10-02T19:25:50.154238650Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154386 env[1138]: time="2023-10-02T19:25:50.154367262Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154522 env[1138]: time="2023-10-02T19:25:50.154503115Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154659 env[1138]: time="2023-10-02T19:25:50.154640733Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.154776 env[1138]: time="2023-10-02T19:25:50.154758085Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:25:50.155090 env[1138]: time="2023-10-02T19:25:50.155053177Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:25:50.155373 env[1138]: time="2023-10-02T19:25:50.155335119Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:25:50.156037 env[1138]: time="2023-10-02T19:25:50.156009730Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:25:50.156215 env[1138]: time="2023-10-02T19:25:50.156193408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.156392 env[1138]: time="2023-10-02T19:25:50.156370111Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:25:50.156597 env[1138]: time="2023-10-02T19:25:50.156577341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.156792 env[1138]: time="2023-10-02T19:25:50.156771964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.156922 env[1138]: time="2023-10-02T19:25:50.156902468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157041 env[1138]: time="2023-10-02T19:25:50.157020602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157169 env[1138]: time="2023-10-02T19:25:50.157149932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157291 env[1138]: time="2023-10-02T19:25:50.157272247Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157423 env[1138]: time="2023-10-02T19:25:50.157404699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157546 env[1138]: time="2023-10-02T19:25:50.157527094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.157685 env[1138]: time="2023-10-02T19:25:50.157666542Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:25:50.158033 env[1138]: time="2023-10-02T19:25:50.157998570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.161220 env[1138]: time="2023-10-02T19:25:50.161171784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.161393 env[1138]: time="2023-10-02T19:25:50.161370156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.161527 env[1138]: time="2023-10-02T19:25:50.161507284Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:25:50.161657 env[1138]: time="2023-10-02T19:25:50.161632251Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:25:50.161783 env[1138]: time="2023-10-02T19:25:50.161764130Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:25:50.161918 env[1138]: time="2023-10-02T19:25:50.161897432Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:25:50.162072 env[1138]: time="2023-10-02T19:25:50.162054167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:25:50.162675 env[1138]: time="2023-10-02T19:25:50.162573219Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:25:50.167652 env[1138]: time="2023-10-02T19:25:50.167617799Z" level=info msg="Connect containerd service" Oct 2 19:25:50.167856 env[1138]: time="2023-10-02T19:25:50.167830466Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:25:50.169021 env[1138]: time="2023-10-02T19:25:50.168981811Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:25:50.175903 env[1138]: time="2023-10-02T19:25:50.175860322Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:25:50.178158 env[1138]: time="2023-10-02T19:25:50.178122281Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:25:50.181051 systemd[1]: Started containerd.service. Oct 2 19:25:50.181481 env[1138]: time="2023-10-02T19:25:50.181440934Z" level=info msg="containerd successfully booted in 0.484533s" Oct 2 19:25:50.185353 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:25:50.188401 dbus-daemon[1103]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1169 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:25:50.188649 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:25:50.203284 systemd[1]: Starting polkit.service... Oct 2 19:25:50.219058 env[1138]: time="2023-10-02T19:25:50.175413875Z" level=info msg="Start subscribing containerd event" Oct 2 19:25:50.219264 env[1138]: time="2023-10-02T19:25:50.219128326Z" level=info msg="Start recovering state" Oct 2 19:25:50.219264 env[1138]: time="2023-10-02T19:25:50.219253025Z" level=info msg="Start event monitor" Oct 2 19:25:50.219391 env[1138]: time="2023-10-02T19:25:50.219288575Z" level=info msg="Start snapshots syncer" Oct 2 19:25:50.219391 env[1138]: time="2023-10-02T19:25:50.219333555Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:25:50.219391 env[1138]: time="2023-10-02T19:25:50.219349223Z" level=info msg="Start streaming server" Oct 2 19:25:50.244485 tar[1133]: ./bridge Oct 2 19:25:50.289994 polkitd[1181]: Started polkitd version 121 Oct 2 19:25:50.318767 polkitd[1181]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:25:50.318872 polkitd[1181]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:25:50.321208 polkitd[1181]: Finished loading, compiling and executing 2 rules Oct 2 19:25:50.321886 dbus-daemon[1103]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:25:50.322142 systemd[1]: Started polkit.service. Oct 2 19:25:50.323049 polkitd[1181]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:25:50.345383 systemd-hostnamed[1169]: Hostname set to (transient) Oct 2 19:25:50.349259 systemd-resolved[1068]: System hostname changed to 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal'. Oct 2 19:25:50.413345 tar[1133]: ./tuning Oct 2 19:25:50.505929 tar[1133]: ./firewall Oct 2 19:25:50.633987 tar[1133]: ./host-device Oct 2 19:25:50.751486 tar[1133]: ./sbr Oct 2 19:25:50.782042 sshd_keygen[1128]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:25:50.854525 tar[1133]: ./loopback Oct 2 19:25:50.871414 systemd[1]: Finished sshd-keygen.service. Oct 2 19:25:50.881878 systemd[1]: Starting issuegen.service... Oct 2 19:25:50.898308 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:25:50.898571 systemd[1]: Finished issuegen.service. Oct 2 19:25:50.909154 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:25:50.930354 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:25:50.933913 tar[1133]: ./dhcp Oct 2 19:25:50.941883 systemd[1]: Started getty@tty1.service. Oct 2 19:25:50.952450 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:25:50.961724 systemd[1]: Reached target getty.target. Oct 2 19:25:51.087177 tar[1133]: ./ptp Oct 2 19:25:51.148000 tar[1133]: ./ipvlan Oct 2 19:25:51.206643 tar[1133]: ./bandwidth Oct 2 19:25:51.295558 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:25:51.423748 systemd[1]: Finished prepare-critools.service. Oct 2 19:25:51.660420 locksmithd[1162]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:25:54.618088 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Oct 2 19:25:56.803133 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:25:56.823915 systemd-nspawn[1211]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Oct 2 19:25:56.823915 systemd-nspawn[1211]: Press ^] three times within 1s to kill container. Oct 2 19:25:56.840147 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:25:56.927526 systemd[1]: Started oem-gce.service. Oct 2 19:25:56.927966 systemd[1]: Reached target multi-user.target. Oct 2 19:25:56.930365 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:25:56.941178 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:25:56.941441 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:25:56.945234 systemd[1]: Startup finished in 1.082s (kernel) + 9.441s (initrd) + 15.683s (userspace) = 26.208s. Oct 2 19:25:57.016560 systemd-nspawn[1211]: + '[' -e /etc/default/instance_configs.cfg.template ']' Oct 2 19:25:57.016560 systemd-nspawn[1211]: + echo -e '[InstanceSetup]\nset_host_keys = false' Oct 2 19:25:57.016862 systemd-nspawn[1211]: + /usr/bin/google_instance_setup Oct 2 19:25:57.666799 instance-setup[1217]: INFO Running google_set_multiqueue. Oct 2 19:25:57.681395 instance-setup[1217]: INFO Set channels for eth0 to 2. Oct 2 19:25:57.685182 instance-setup[1217]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Oct 2 19:25:57.686601 instance-setup[1217]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Oct 2 19:25:57.687191 instance-setup[1217]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Oct 2 19:25:57.688417 instance-setup[1217]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Oct 2 19:25:57.688821 instance-setup[1217]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Oct 2 19:25:57.690230 instance-setup[1217]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Oct 2 19:25:57.690677 instance-setup[1217]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Oct 2 19:25:57.692171 instance-setup[1217]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Oct 2 19:25:57.703842 instance-setup[1217]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Oct 2 19:25:57.704018 instance-setup[1217]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Oct 2 19:25:57.747800 systemd-nspawn[1211]: + /usr/bin/google_metadata_script_runner --script-type startup Oct 2 19:25:58.090066 startup-script[1248]: INFO Starting startup scripts. Oct 2 19:25:58.104470 startup-script[1248]: INFO No startup scripts found in metadata. Oct 2 19:25:58.104634 startup-script[1248]: INFO Finished running startup scripts. Oct 2 19:25:58.140551 systemd-nspawn[1211]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Oct 2 19:25:58.140551 systemd-nspawn[1211]: + daemon_pids=() Oct 2 19:25:58.141320 systemd-nspawn[1211]: + for d in accounts clock_skew network Oct 2 19:25:58.141320 systemd-nspawn[1211]: + daemon_pids+=($!) Oct 2 19:25:58.141320 systemd-nspawn[1211]: + for d in accounts clock_skew network Oct 2 19:25:58.141320 systemd-nspawn[1211]: + daemon_pids+=($!) Oct 2 19:25:58.141320 systemd-nspawn[1211]: + for d in accounts clock_skew network Oct 2 19:25:58.141587 systemd-nspawn[1211]: + daemon_pids+=($!) Oct 2 19:25:58.141587 systemd-nspawn[1211]: + NOTIFY_SOCKET=/run/systemd/notify Oct 2 19:25:58.141587 systemd-nspawn[1211]: + /usr/bin/systemd-notify --ready Oct 2 19:25:58.142143 systemd-nspawn[1211]: + /usr/bin/google_clock_skew_daemon Oct 2 19:25:58.142382 systemd-nspawn[1211]: + /usr/bin/google_network_daemon Oct 2 19:25:58.142829 systemd-nspawn[1211]: + /usr/bin/google_accounts_daemon Oct 2 19:25:58.196650 systemd-nspawn[1211]: + wait -n 36 37 38 Oct 2 19:25:58.851299 google-clock-skew[1252]: INFO Starting Google Clock Skew daemon. Oct 2 19:25:58.868327 google-clock-skew[1252]: INFO Clock drift token has changed: 0. Oct 2 19:25:58.875346 systemd-nspawn[1211]: hwclock: Cannot access the Hardware Clock via any known method. Oct 2 19:25:58.875346 systemd-nspawn[1211]: hwclock: Use the --verbose option to see the details of our search for an access method. Oct 2 19:25:58.876222 google-clock-skew[1252]: WARNING Failed to sync system time with hardware clock. Oct 2 19:25:58.890710 google-networking[1253]: INFO Starting Google Networking daemon. Oct 2 19:25:58.900723 groupadd[1262]: group added to /etc/group: name=google-sudoers, GID=1000 Oct 2 19:25:58.906060 groupadd[1262]: group added to /etc/gshadow: name=google-sudoers Oct 2 19:25:58.911252 groupadd[1262]: new group: name=google-sudoers, GID=1000 Oct 2 19:25:58.929794 google-accounts[1251]: INFO Starting Google Accounts daemon. Oct 2 19:25:58.956705 google-accounts[1251]: WARNING OS Login not installed. Oct 2 19:25:58.957967 google-accounts[1251]: INFO Creating a new user account for 0. Oct 2 19:25:58.963625 systemd-nspawn[1211]: useradd: invalid user name '0': use --badname to ignore Oct 2 19:25:58.964422 google-accounts[1251]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Oct 2 19:25:59.088387 systemd[1]: Created slice system-sshd.slice. Oct 2 19:25:59.090380 systemd[1]: Started sshd@0-10.128.0.85:22-147.75.109.163:37794.service. Oct 2 19:25:59.407422 sshd[1274]: Accepted publickey for core from 147.75.109.163 port 37794 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:25:59.411479 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:59.429226 systemd[1]: Created slice user-500.slice. Oct 2 19:25:59.431716 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:25:59.435268 systemd-logind[1123]: New session 1 of user core. Oct 2 19:25:59.446345 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:25:59.448596 systemd[1]: Starting user@500.service... Oct 2 19:25:59.462496 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:25:59.571306 systemd[1277]: Queued start job for default target default.target. Oct 2 19:25:59.572381 systemd[1277]: Reached target paths.target. Oct 2 19:25:59.572426 systemd[1277]: Reached target sockets.target. Oct 2 19:25:59.572450 systemd[1277]: Reached target timers.target. Oct 2 19:25:59.572471 systemd[1277]: Reached target basic.target. Oct 2 19:25:59.572658 systemd[1]: Started user@500.service. Oct 2 19:25:59.574311 systemd[1]: Started session-1.scope. Oct 2 19:25:59.575401 systemd[1277]: Reached target default.target. Oct 2 19:25:59.575667 systemd[1277]: Startup finished in 104ms. Oct 2 19:25:59.800615 systemd[1]: Started sshd@1-10.128.0.85:22-147.75.109.163:37808.service. Oct 2 19:26:00.093657 sshd[1286]: Accepted publickey for core from 147.75.109.163 port 37808 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:00.095297 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:00.102698 systemd[1]: Started session-2.scope. Oct 2 19:26:00.103758 systemd-logind[1123]: New session 2 of user core. Oct 2 19:26:00.314678 sshd[1286]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:00.319155 systemd-logind[1123]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:26:00.319438 systemd[1]: sshd@1-10.128.0.85:22-147.75.109.163:37808.service: Deactivated successfully. Oct 2 19:26:00.320631 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:26:00.321724 systemd-logind[1123]: Removed session 2. Oct 2 19:26:00.361832 systemd[1]: Started sshd@2-10.128.0.85:22-147.75.109.163:37810.service. Oct 2 19:26:00.658214 sshd[1292]: Accepted publickey for core from 147.75.109.163 port 37810 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:00.660133 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:00.667172 systemd[1]: Started session-3.scope. Oct 2 19:26:00.668025 systemd-logind[1123]: New session 3 of user core. Oct 2 19:26:00.870204 sshd[1292]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:00.874446 systemd[1]: sshd@2-10.128.0.85:22-147.75.109.163:37810.service: Deactivated successfully. Oct 2 19:26:00.875536 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:26:00.876533 systemd-logind[1123]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:26:00.877843 systemd-logind[1123]: Removed session 3. Oct 2 19:26:00.916310 systemd[1]: Started sshd@3-10.128.0.85:22-147.75.109.163:37816.service. Oct 2 19:26:01.212312 sshd[1298]: Accepted publickey for core from 147.75.109.163 port 37816 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:01.214294 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:01.221635 systemd[1]: Started session-4.scope. Oct 2 19:26:01.222356 systemd-logind[1123]: New session 4 of user core. Oct 2 19:26:01.430041 sshd[1298]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:01.434366 systemd[1]: sshd@3-10.128.0.85:22-147.75.109.163:37816.service: Deactivated successfully. Oct 2 19:26:01.435406 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:26:01.436239 systemd-logind[1123]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:26:01.437725 systemd-logind[1123]: Removed session 4. Oct 2 19:26:01.476139 systemd[1]: Started sshd@4-10.128.0.85:22-147.75.109.163:37826.service. Oct 2 19:26:01.770044 sshd[1304]: Accepted publickey for core from 147.75.109.163 port 37826 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:01.772056 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:01.779234 systemd[1]: Started session-5.scope. Oct 2 19:26:01.779880 systemd-logind[1123]: New session 5 of user core. Oct 2 19:26:01.981285 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:26:01.981682 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:26:01.991406 dbus-daemon[1103]: \xd0\xcd\xdd\xdfeU: received setenforce notice (enforcing=1480547648) Oct 2 19:26:01.993709 sudo[1307]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:02.039257 sshd[1304]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:02.044150 systemd[1]: sshd@4-10.128.0.85:22-147.75.109.163:37826.service: Deactivated successfully. Oct 2 19:26:02.045370 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:26:02.046511 systemd-logind[1123]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:26:02.048107 systemd-logind[1123]: Removed session 5. Oct 2 19:26:02.085751 systemd[1]: Started sshd@5-10.128.0.85:22-147.75.109.163:37828.service. Oct 2 19:26:02.381649 sshd[1311]: Accepted publickey for core from 147.75.109.163 port 37828 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:02.383920 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:02.390965 systemd[1]: Started session-6.scope. Oct 2 19:26:02.392018 systemd-logind[1123]: New session 6 of user core. Oct 2 19:26:02.561453 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:26:02.561861 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:26:02.566430 sudo[1315]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:02.578980 sudo[1314]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:26:02.579536 sudo[1314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:26:02.592836 systemd[1]: Stopping audit-rules.service... Oct 2 19:26:02.593000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:26:02.600556 kernel: kauditd_printk_skb: 135 callbacks suppressed Oct 2 19:26:02.600700 kernel: audit: type=1305 audit(1696274762.593:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:26:02.600781 auditctl[1318]: No rules Oct 2 19:26:02.601595 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:26:02.601863 systemd[1]: Stopped audit-rules.service. Oct 2 19:26:02.609446 systemd[1]: Starting audit-rules.service... Oct 2 19:26:02.615124 kernel: audit: type=1300 audit(1696274762.593:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd7952f90 a2=420 a3=0 items=0 ppid=1 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:02.593000 audit[1318]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd7952f90 a2=420 a3=0 items=0 ppid=1 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:02.645763 augenrules[1335]: No rules Oct 2 19:26:02.593000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:26:02.649071 sudo[1314]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:02.647279 systemd[1]: Finished audit-rules.service. Oct 2 19:26:02.656611 kernel: audit: type=1327 audit(1696274762.593:173): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:26:02.656780 kernel: audit: type=1131 audit(1696274762.599:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.679122 kernel: audit: type=1130 audit(1696274762.645:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.715535 kernel: audit: type=1106 audit(1696274762.645:176): pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.645000 audit[1314]: USER_END pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.709571 systemd-logind[1123]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:26:02.704499 sshd[1311]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:02.711770 systemd[1]: sshd@5-10.128.0.85:22-147.75.109.163:37828.service: Deactivated successfully. Oct 2 19:26:02.712901 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:26:02.714781 systemd-logind[1123]: Removed session 6. Oct 2 19:26:02.645000 audit[1314]: CRED_DISP pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.750649 kernel: audit: type=1104 audit(1696274762.645:177): pid=1314 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.757034 kernel: audit: type=1106 audit(1696274762.700:178): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:02.700000 audit[1311]: USER_END pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:02.759475 systemd[1]: Started sshd@6-10.128.0.85:22-147.75.109.163:34286.service. Oct 2 19:26:02.700000 audit[1311]: CRED_DISP pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:02.811868 kernel: audit: type=1104 audit(1696274762.700:179): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:02.812053 kernel: audit: type=1131 audit(1696274762.706:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.85:22-147.75.109.163:37828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.85:22-147.75.109.163:37828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:02.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.85:22-147.75.109.163:34286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:03.077000 audit[1341]: USER_ACCT pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:03.078598 sshd[1341]: Accepted publickey for core from 147.75.109.163 port 34286 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:26:03.080000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:03.080000 audit[1341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01cd3760 a2=3 a3=0 items=0 ppid=1 pid=1341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:03.080000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:26:03.080911 sshd[1341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:26:03.088437 systemd[1]: Started session-7.scope. Oct 2 19:26:03.089142 systemd-logind[1123]: New session 7 of user core. Oct 2 19:26:03.097000 audit[1341]: USER_START pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:03.099000 audit[1343]: CRED_ACQ pid=1343 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:03.254000 audit[1344]: USER_ACCT pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:03.255462 sudo[1344]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:26:03.254000 audit[1344]: CRED_REFR pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:03.255937 sudo[1344]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:26:03.257000 audit[1344]: USER_START pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:03.874048 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:26:03.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:03.883564 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:26:03.884576 systemd[1]: Reached target network-online.target. Oct 2 19:26:03.886745 systemd[1]: Starting docker.service... Oct 2 19:26:03.944174 env[1360]: time="2023-10-02T19:26:03.944074350Z" level=info msg="Starting up" Oct 2 19:26:03.946749 env[1360]: time="2023-10-02T19:26:03.946691102Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:26:03.946749 env[1360]: time="2023-10-02T19:26:03.946724412Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:26:03.946939 env[1360]: time="2023-10-02T19:26:03.946754655Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:26:03.946939 env[1360]: time="2023-10-02T19:26:03.946771369Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:26:03.949386 env[1360]: time="2023-10-02T19:26:03.949330948Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:26:03.949386 env[1360]: time="2023-10-02T19:26:03.949361047Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:26:03.949386 env[1360]: time="2023-10-02T19:26:03.949385365Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:26:03.949650 env[1360]: time="2023-10-02T19:26:03.949399471Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:26:03.958053 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3496751787-merged.mount: Deactivated successfully. Oct 2 19:26:04.031520 env[1360]: time="2023-10-02T19:26:04.031450196Z" level=info msg="Loading containers: start." Oct 2 19:26:04.110000 audit[1391]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.110000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd3e3018f0 a2=0 a3=7ffd3e3018dc items=0 ppid=1360 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:26:04.113000 audit[1393]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.113000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdf1eecce0 a2=0 a3=7ffdf1eecccc items=0 ppid=1360 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:26:04.116000 audit[1395]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.116000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcdfeea090 a2=0 a3=7ffcdfeea07c items=0 ppid=1360 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:26:04.119000 audit[1397]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.119000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc7dc6fa0 a2=0 a3=7ffcc7dc6f8c items=0 ppid=1360 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:26:04.123000 audit[1399]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.123000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf1a73ec0 a2=0 a3=7ffcf1a73eac items=0 ppid=1360 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:26:04.144000 audit[1404]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.144000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc41aa4680 a2=0 a3=7ffc41aa466c items=0 ppid=1360 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.144000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:26:04.157000 audit[1406]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.157000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff72baa400 a2=0 a3=7fff72baa3ec items=0 ppid=1360 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:26:04.160000 audit[1408]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.160000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd17da9c10 a2=0 a3=7ffd17da9bfc items=0 ppid=1360 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.160000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:26:04.163000 audit[1410]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.163000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcefc67e70 a2=0 a3=7ffcefc67e5c items=0 ppid=1360 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:26:04.179000 audit[1414]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.179000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdc6115d90 a2=0 a3=7ffdc6115d7c items=0 ppid=1360 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:26:04.181000 audit[1415]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.181000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdb1b7f200 a2=0 a3=7ffdb1b7f1ec items=0 ppid=1360 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:26:04.198111 kernel: Initializing XFRM netlink socket Oct 2 19:26:04.248197 env[1360]: time="2023-10-02T19:26:04.248132432Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:26:04.283000 audit[1423]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.283000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb4a259c0 a2=0 a3=7fffb4a259ac items=0 ppid=1360 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:26:04.297000 audit[1426]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.297000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffca1c2fb70 a2=0 a3=7ffca1c2fb5c items=0 ppid=1360 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:26:04.302000 audit[1429]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.302000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd1e612540 a2=0 a3=7ffd1e61252c items=0 ppid=1360 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:26:04.305000 audit[1431]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.305000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe26c044b0 a2=0 a3=7ffe26c0449c items=0 ppid=1360 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:26:04.309000 audit[1433]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.309000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffccd01b340 a2=0 a3=7ffccd01b32c items=0 ppid=1360 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.309000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:26:04.312000 audit[1435]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.312000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffca05ac3a0 a2=0 a3=7ffca05ac38c items=0 ppid=1360 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:26:04.316000 audit[1437]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.316000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe5fd7a8d0 a2=0 a3=7ffe5fd7a8bc items=0 ppid=1360 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:26:04.328000 audit[1440]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.328000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdcfc61670 a2=0 a3=7ffdcfc6165c items=0 ppid=1360 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:26:04.332000 audit[1442]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.332000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd0fbe26e0 a2=0 a3=7ffd0fbe26cc items=0 ppid=1360 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:26:04.336000 audit[1444]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.336000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc1f6df5d0 a2=0 a3=7ffc1f6df5bc items=0 ppid=1360 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:26:04.339000 audit[1446]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.339000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe0f3d55a0 a2=0 a3=7ffe0f3d558c items=0 ppid=1360 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.339000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:26:04.340839 systemd-networkd[1022]: docker0: Link UP Oct 2 19:26:04.356000 audit[1450]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.356000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff272f1a30 a2=0 a3=7fff272f1a1c items=0 ppid=1360 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:26:04.358000 audit[1451]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:04.358000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff2339aba0 a2=0 a3=7fff2339ab8c items=0 ppid=1360 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:04.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:26:04.359953 env[1360]: time="2023-10-02T19:26:04.359903832Z" level=info msg="Loading containers: done." Oct 2 19:26:04.382141 env[1360]: time="2023-10-02T19:26:04.382046094Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:26:04.382432 env[1360]: time="2023-10-02T19:26:04.382406932Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:26:04.382597 env[1360]: time="2023-10-02T19:26:04.382566987Z" level=info msg="Daemon has completed initialization" Oct 2 19:26:04.414276 systemd[1]: Started docker.service. Oct 2 19:26:04.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:04.428450 env[1360]: time="2023-10-02T19:26:04.428353209Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:26:04.455513 systemd[1]: Reloading. Oct 2 19:26:04.538076 /usr/lib/systemd/system-generators/torcx-generator[1499]: time="2023-10-02T19:26:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:26:04.538138 /usr/lib/systemd/system-generators/torcx-generator[1499]: time="2023-10-02T19:26:04Z" level=info msg="torcx already run" Oct 2 19:26:04.674656 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:26:04.674686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:26:04.701932 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.788000 audit: BPF prog-id=40 op=LOAD Oct 2 19:26:04.788000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.789000 audit: BPF prog-id=41 op=LOAD Oct 2 19:26:04.789000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit: BPF prog-id=42 op=LOAD Oct 2 19:26:04.791000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit: BPF prog-id=43 op=LOAD Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.791000 audit: BPF prog-id=44 op=LOAD Oct 2 19:26:04.791000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:26:04.791000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.794000 audit: BPF prog-id=45 op=LOAD Oct 2 19:26:04.794000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit: BPF prog-id=46 op=LOAD Oct 2 19:26:04.797000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit: BPF prog-id=47 op=LOAD Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.797000 audit: BPF prog-id=48 op=LOAD Oct 2 19:26:04.797000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:26:04.797000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit: BPF prog-id=49 op=LOAD Oct 2 19:26:04.799000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit: BPF prog-id=50 op=LOAD Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.800000 audit: BPF prog-id=51 op=LOAD Oct 2 19:26:04.800000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:26:04.800000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.801000 audit: BPF prog-id=52 op=LOAD Oct 2 19:26:04.801000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.802000 audit: BPF prog-id=53 op=LOAD Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.803000 audit: BPF prog-id=54 op=LOAD Oct 2 19:26:04.803000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:26:04.803000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit: BPF prog-id=55 op=LOAD Oct 2 19:26:04.805000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit: BPF prog-id=56 op=LOAD Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:04.805000 audit: BPF prog-id=57 op=LOAD Oct 2 19:26:04.805000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:26:04.805000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:26:04.843357 systemd[1]: Started kubelet.service. Oct 2 19:26:04.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:04.947320 kubelet[1541]: E1002 19:26:04.947142 1541 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:26:04.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:26:04.951059 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:26:04.951326 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:26:05.525539 env[1138]: time="2023-10-02T19:26:05.525463440Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\"" Oct 2 19:26:06.042902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1763821928.mount: Deactivated successfully. Oct 2 19:26:08.222104 env[1138]: time="2023-10-02T19:26:08.222018202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:08.225793 env[1138]: time="2023-10-02T19:26:08.225721193Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:08.229063 env[1138]: time="2023-10-02T19:26:08.229000106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:08.232609 env[1138]: time="2023-10-02T19:26:08.232544446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:08.234063 env[1138]: time="2023-10-02T19:26:08.234015130Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2\"" Oct 2 19:26:08.251274 env[1138]: time="2023-10-02T19:26:08.251172559Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\"" Oct 2 19:26:10.395232 env[1138]: time="2023-10-02T19:26:10.395146838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.398648 env[1138]: time="2023-10-02T19:26:10.398597789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.401486 env[1138]: time="2023-10-02T19:26:10.401437697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.404133 env[1138]: time="2023-10-02T19:26:10.404069747Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:10.405143 env[1138]: time="2023-10-02T19:26:10.405069639Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c\"" Oct 2 19:26:10.420436 env[1138]: time="2023-10-02T19:26:10.420387972Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\"" Oct 2 19:26:11.654957 env[1138]: time="2023-10-02T19:26:11.654883172Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:11.658261 env[1138]: time="2023-10-02T19:26:11.658188472Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:11.661473 env[1138]: time="2023-10-02T19:26:11.661404394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:11.665104 env[1138]: time="2023-10-02T19:26:11.665034365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:11.666937 env[1138]: time="2023-10-02T19:26:11.666867169Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999\"" Oct 2 19:26:11.685379 env[1138]: time="2023-10-02T19:26:11.685269590Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 19:26:12.683990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1687231337.mount: Deactivated successfully. Oct 2 19:26:13.268556 env[1138]: time="2023-10-02T19:26:13.268473794Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.272270 env[1138]: time="2023-10-02T19:26:13.272197185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.275190 env[1138]: time="2023-10-02T19:26:13.275141958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.281943 env[1138]: time="2023-10-02T19:26:13.281880312Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.282766 env[1138]: time="2023-10-02T19:26:13.282705026Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\"" Oct 2 19:26:13.299348 env[1138]: time="2023-10-02T19:26:13.299295716Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:26:13.677040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount747614759.mount: Deactivated successfully. Oct 2 19:26:13.686394 env[1138]: time="2023-10-02T19:26:13.686314319Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.689692 env[1138]: time="2023-10-02T19:26:13.689633017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.692539 env[1138]: time="2023-10-02T19:26:13.692483980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.695203 env[1138]: time="2023-10-02T19:26:13.695151040Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:13.696176 env[1138]: time="2023-10-02T19:26:13.696129696Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:26:13.711634 env[1138]: time="2023-10-02T19:26:13.711580458Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:26:14.441409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount126653844.mount: Deactivated successfully. Oct 2 19:26:15.028381 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:26:15.056143 kernel: kauditd_printk_skb: 293 callbacks suppressed Oct 2 19:26:15.056336 kernel: audit: type=1130 audit(1696274775.027:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.056381 kernel: audit: type=1131 audit(1696274775.027:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.028719 systemd[1]: Stopped kubelet.service. Oct 2 19:26:15.031251 systemd[1]: Started kubelet.service. Oct 2 19:26:15.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.099986 kernel: audit: type=1130 audit(1696274775.030:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:15.122109 kubelet[1587]: E1002 19:26:15.122008 1587 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:26:15.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:26:15.128728 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:26:15.128948 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:26:15.151122 kernel: audit: type=1131 audit(1696274775.128:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:26:18.884266 env[1138]: time="2023-10-02T19:26:18.884187315Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:18.887740 env[1138]: time="2023-10-02T19:26:18.887677790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:18.891221 env[1138]: time="2023-10-02T19:26:18.891171256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:18.893954 env[1138]: time="2023-10-02T19:26:18.893903056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:18.895180 env[1138]: time="2023-10-02T19:26:18.895105837Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:26:18.910291 env[1138]: time="2023-10-02T19:26:18.910234178Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:26:19.333662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1446594153.mount: Deactivated successfully. Oct 2 19:26:20.259190 env[1138]: time="2023-10-02T19:26:20.259123554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:20.262935 env[1138]: time="2023-10-02T19:26:20.262845382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:20.265827 env[1138]: time="2023-10-02T19:26:20.265773059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:20.268735 env[1138]: time="2023-10-02T19:26:20.268667529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:20.269863 env[1138]: time="2023-10-02T19:26:20.269800818Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:26:20.377996 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:26:20.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.402331 kernel: audit: type=1131 audit(1696274780.377:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:20.415000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:26:20.415000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:26:20.431904 kernel: audit: type=1334 audit(1696274780.415:429): prog-id=44 op=UNLOAD Oct 2 19:26:20.432088 kernel: audit: type=1334 audit(1696274780.415:430): prog-id=43 op=UNLOAD Oct 2 19:26:20.432153 kernel: audit: type=1334 audit(1696274780.415:431): prog-id=42 op=UNLOAD Oct 2 19:26:20.415000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:26:23.846493 systemd[1]: Stopped kubelet.service. Oct 2 19:26:23.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:23.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:23.881458 systemd[1]: Reloading. Oct 2 19:26:23.890916 kernel: audit: type=1130 audit(1696274783.845:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:23.891091 kernel: audit: type=1131 audit(1696274783.845:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:24.001042 /usr/lib/systemd/system-generators/torcx-generator[1678]: time="2023-10-02T19:26:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:26:24.006229 /usr/lib/systemd/system-generators/torcx-generator[1678]: time="2023-10-02T19:26:24Z" level=info msg="torcx already run" Oct 2 19:26:24.100018 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:26:24.100049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:26:24.127178 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.234242 kernel: audit: type=1400 audit(1696274784.212:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.276106 kernel: audit: type=1400 audit(1696274784.212:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.276281 kernel: audit: type=1400 audit(1696274784.212:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit: BPF prog-id=58 op=LOAD Oct 2 19:26:24.233000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299103 kernel: audit: type=1400 audit(1696274784.212:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit: BPF prog-id=59 op=LOAD Oct 2 19:26:24.254000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.275000 audit: BPF prog-id=60 op=LOAD Oct 2 19:26:24.275000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit: BPF prog-id=61 op=LOAD Oct 2 19:26:24.299000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit: BPF prog-id=62 op=LOAD Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.299000 audit: BPF prog-id=63 op=LOAD Oct 2 19:26:24.299000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:26:24.299000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit: BPF prog-id=64 op=LOAD Oct 2 19:26:24.301000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit: BPF prog-id=65 op=LOAD Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit: BPF prog-id=66 op=LOAD Oct 2 19:26:24.302000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:26:24.302000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.303000 audit: BPF prog-id=67 op=LOAD Oct 2 19:26:24.303000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.304000 audit: BPF prog-id=68 op=LOAD Oct 2 19:26:24.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.305000 audit: BPF prog-id=69 op=LOAD Oct 2 19:26:24.305000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:26:24.305000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit: BPF prog-id=70 op=LOAD Oct 2 19:26:24.307000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit: BPF prog-id=71 op=LOAD Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.307000 audit: BPF prog-id=72 op=LOAD Oct 2 19:26:24.307000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:26:24.307000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:26:24.329205 systemd[1]: Started kubelet.service. Oct 2 19:26:24.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:24.405038 kubelet[1722]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:24.405038 kubelet[1722]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:24.406021 kubelet[1722]: I1002 19:26:24.405970 1722 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:26:24.408431 kubelet[1722]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:24.408582 kubelet[1722]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:24.877555 kubelet[1722]: I1002 19:26:24.877498 1722 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:26:24.877555 kubelet[1722]: I1002 19:26:24.877544 1722 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:26:24.877932 kubelet[1722]: I1002 19:26:24.877888 1722 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:26:24.881866 kubelet[1722]: E1002 19:26:24.881833 1722 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.85:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.882154 kubelet[1722]: I1002 19:26:24.882131 1722 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:26:24.887055 kubelet[1722]: I1002 19:26:24.887003 1722 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:26:24.887432 kubelet[1722]: I1002 19:26:24.887399 1722 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:26:24.887554 kubelet[1722]: I1002 19:26:24.887498 1722 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:26:24.887554 kubelet[1722]: I1002 19:26:24.887529 1722 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:26:24.887554 kubelet[1722]: I1002 19:26:24.887550 1722 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:26:24.887837 kubelet[1722]: I1002 19:26:24.887694 1722 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:24.892677 kubelet[1722]: I1002 19:26:24.892645 1722 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:26:24.892677 kubelet[1722]: I1002 19:26:24.892680 1722 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:26:24.892883 kubelet[1722]: I1002 19:26:24.892716 1722 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:26:24.892883 kubelet[1722]: I1002 19:26:24.892732 1722 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:26:24.893736 kubelet[1722]: W1002 19:26:24.893670 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.893866 kubelet[1722]: E1002 19:26:24.893753 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.893866 kubelet[1722]: I1002 19:26:24.893846 1722 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:26:24.897735 kubelet[1722]: W1002 19:26:24.897637 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.897735 kubelet[1722]: E1002 19:26:24.897742 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.899418 kubelet[1722]: W1002 19:26:24.899386 1722 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:26:24.900374 kubelet[1722]: I1002 19:26:24.900342 1722 server.go:1186] "Started kubelet" Oct 2 19:26:24.907715 kubelet[1722]: E1002 19:26:24.907582 1722 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edfb6e1ef7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 900226807, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 900226807, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.85:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.85:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:26:24.907000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.907000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:24.907000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fd8ed0 a1=c000fcca68 a2=c000fd8ea0 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.907000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:24.908000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:24.908000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:24.908000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010242c0 a1=c000fcca80 a2=c000fd8f60 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.908000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:24.909690 kubelet[1722]: I1002 19:26:24.909152 1722 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:26:24.909690 kubelet[1722]: I1002 19:26:24.909223 1722 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:26:24.909690 kubelet[1722]: I1002 19:26:24.909349 1722 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:26:24.910774 kubelet[1722]: E1002 19:26:24.910749 1722 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:26:24.910941 kubelet[1722]: E1002 19:26:24.910922 1722 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:26:24.913754 kubelet[1722]: I1002 19:26:24.913716 1722 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:26:24.914830 kubelet[1722]: I1002 19:26:24.914797 1722 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:26:24.916000 audit[1733]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.916000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff055077c0 a2=0 a3=7fff055077ac items=0 ppid=1722 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:26:24.918872 kubelet[1722]: I1002 19:26:24.918849 1722 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:26:24.919972 kubelet[1722]: E1002 19:26:24.919916 1722 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.85:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.921344 kubelet[1722]: I1002 19:26:24.921003 1722 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:26:24.921632 kubelet[1722]: W1002 19:26:24.921566 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.921632 kubelet[1722]: E1002 19:26:24.921625 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:24.923000 audit[1734]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.923000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9cd68de0 a2=0 a3=7ffe9cd68dcc items=0 ppid=1722 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:26:24.931000 audit[1736]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.931000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd655d1430 a2=0 a3=7ffd655d141c items=0 ppid=1722 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:24.935000 audit[1738]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.935000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd99dda1a0 a2=0 a3=7ffd99dda18c items=0 ppid=1722 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:26:24.947000 audit[1741]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.947000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcfd442b70 a2=0 a3=7ffcfd442b5c items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.947000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:26:24.948000 audit[1743]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.948000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe20aa1310 a2=0 a3=7ffe20aa12fc items=0 ppid=1722 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:26:24.966000 audit[1748]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.966000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc7a366090 a2=0 a3=7ffc7a36607c items=0 ppid=1722 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:26:24.974842 kubelet[1722]: I1002 19:26:24.974816 1722 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:26:24.975007 kubelet[1722]: I1002 19:26:24.974995 1722 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:26:24.975164 kubelet[1722]: I1002 19:26:24.975149 1722 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:24.976000 audit[1751]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.976000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffead7b0480 a2=0 a3=7ffead7b046c items=0 ppid=1722 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:26:24.978454 kubelet[1722]: I1002 19:26:24.978416 1722 policy_none.go:49] "None policy: Start" Oct 2 19:26:24.978000 audit[1752]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.978000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8cf45a20 a2=0 a3=7fff8cf45a0c items=0 ppid=1722 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:26:24.981690 kubelet[1722]: I1002 19:26:24.981668 1722 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:26:24.981847 kubelet[1722]: I1002 19:26:24.981832 1722 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:26:24.981000 audit[1753]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.981000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0c773c20 a2=0 a3=7ffc0c773c0c items=0 ppid=1722 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:26:24.991036 systemd[1]: Created slice kubepods.slice. Oct 2 19:26:24.996000 audit[1755]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:24.996000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffffc4eb5a0 a2=0 a3=7ffffc4eb58c items=0 ppid=1722 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:24.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:26:25.001271 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:26:25.007219 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:26:25.008000 audit[1757]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.008000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffceaf95640 a2=0 a3=7ffceaf9562c items=0 ppid=1722 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:26:25.012153 kubelet[1722]: I1002 19:26:25.012119 1722 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:26:25.011000 audit[1722]: AVC avc: denied { mac_admin } for pid=1722 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:25.011000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:25.011000 audit[1722]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000baae40 a1=c000bbd098 a2=c000baae10 a3=25 items=0 ppid=1 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.011000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:25.012665 kubelet[1722]: I1002 19:26:25.012221 1722 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:26:25.012665 kubelet[1722]: I1002 19:26:25.012466 1722 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:26:25.014902 kubelet[1722]: E1002 19:26:25.014872 1722 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:25.017000 audit[1759]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.017000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc8b46c7f0 a2=0 a3=7ffc8b46c7dc items=0 ppid=1722 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:26:25.022000 audit[1762]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.022000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff3ec0ce20 a2=0 a3=7fff3ec0ce0c items=0 ppid=1722 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:26:25.025284 kubelet[1722]: I1002 19:26:25.025257 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.026018 kubelet[1722]: E1002 19:26:25.025983 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.85:6443/api/v1/nodes\": dial tcp 10.128.0.85:6443: connect: connection refused" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.028000 audit[1764]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.028000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc21fee090 a2=0 a3=7ffc21fee07c items=0 ppid=1722 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:26:25.029559 kubelet[1722]: I1002 19:26:25.029478 1722 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:26:25.030000 audit[1765]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.030000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb72dda70 a2=0 a3=7fffb72dda5c items=0 ppid=1722 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:26:25.031000 audit[1766]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.031000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6ac337a0 a2=0 a3=7ffd6ac3378c items=0 ppid=1722 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:26:25.032000 audit[1767]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.032000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcd956fe60 a2=0 a3=7ffcd956fe4c items=0 ppid=1722 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:26:25.033000 audit[1768]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.033000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff79ca6840 a2=0 a3=7fff79ca682c items=0 ppid=1722 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:26:25.037000 audit[1770]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:25.037000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7c953ae0 a2=0 a3=7ffd7c953acc items=0 ppid=1722 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:26:25.038000 audit[1771]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.038000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe31be5650 a2=0 a3=7ffe31be563c items=0 ppid=1722 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:26:25.040000 audit[1772]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.040000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc0f0dc190 a2=0 a3=7ffc0f0dc17c items=0 ppid=1722 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:26:25.044000 audit[1774]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.044000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff3bd3c1d0 a2=0 a3=7fff3bd3c1bc items=0 ppid=1722 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:26:25.046000 audit[1775]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.046000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff4d8d9770 a2=0 a3=7fff4d8d975c items=0 ppid=1722 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:26:25.048000 audit[1776]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.048000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c3f7850 a2=0 a3=7ffd6c3f783c items=0 ppid=1722 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:26:25.052000 audit[1778]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.052000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc17a441c0 a2=0 a3=7ffc17a441ac items=0 ppid=1722 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:26:25.056000 audit[1780]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.056000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc0ebb2e60 a2=0 a3=7ffc0ebb2e4c items=0 ppid=1722 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:26:25.060000 audit[1782]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.060000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe335d20f0 a2=0 a3=7ffe335d20dc items=0 ppid=1722 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:26:25.063000 audit[1784]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.063000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffee1a6acb0 a2=0 a3=7ffee1a6ac9c items=0 ppid=1722 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:26:25.068000 audit[1786]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.068000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7fffd6c36a50 a2=0 a3=7fffd6c36a3c items=0 ppid=1722 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:26:25.070709 kubelet[1722]: I1002 19:26:25.070683 1722 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:26:25.070924 kubelet[1722]: I1002 19:26:25.070887 1722 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:26:25.071169 kubelet[1722]: I1002 19:26:25.071148 1722 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:26:25.071365 kubelet[1722]: E1002 19:26:25.071348 1722 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:26:25.071000 audit[1787]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.071000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddf9202f0 a2=0 a3=7ffddf9202dc items=0 ppid=1722 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:26:25.073267 kubelet[1722]: W1002 19:26:25.073213 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:25.073413 kubelet[1722]: E1002 19:26:25.073396 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:25.073000 audit[1788]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.073000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffdc02380 a2=0 a3=7ffffdc0236c items=0 ppid=1722 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:26:25.075000 audit[1789]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:25.075000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd08e73c80 a2=0 a3=7ffd08e73c6c items=0 ppid=1722 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:25.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:26:25.121298 kubelet[1722]: E1002 19:26:25.121239 1722 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.85:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:25.171773 kubelet[1722]: I1002 19:26:25.171597 1722 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:25.180047 kubelet[1722]: I1002 19:26:25.180011 1722 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:25.186300 kubelet[1722]: I1002 19:26:25.186264 1722 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:25.187245 kubelet[1722]: I1002 19:26:25.187217 1722 status_manager.go:698] "Failed to get status for pod" podUID=08574f7d354540dd2e1c660456e88a19 pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" err="Get \"https://10.128.0.85:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\": dial tcp 10.128.0.85:6443: connect: connection refused" Oct 2 19:26:25.193852 kubelet[1722]: I1002 19:26:25.193645 1722 status_manager.go:698] "Failed to get status for pod" podUID=7f43c7dc3df7bddde5656d8be1e79f36 pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" err="Get \"https://10.128.0.85:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\": dial tcp 10.128.0.85:6443: connect: connection refused" Oct 2 19:26:25.195741 systemd[1]: Created slice kubepods-burstable-pod08574f7d354540dd2e1c660456e88a19.slice. Oct 2 19:26:25.199572 kubelet[1722]: I1002 19:26:25.199545 1722 status_manager.go:698] "Failed to get status for pod" podUID=efa388f02b1e876c250d4a065a885d94 pod="kube-system/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" err="Get \"https://10.128.0.85:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\": dial tcp 10.128.0.85:6443: connect: connection refused" Oct 2 19:26:25.206255 systemd[1]: Created slice kubepods-burstable-pod7f43c7dc3df7bddde5656d8be1e79f36.slice. Oct 2 19:26:25.220847 systemd[1]: Created slice kubepods-burstable-podefa388f02b1e876c250d4a065a885d94.slice. Oct 2 19:26:25.227412 kubelet[1722]: I1002 19:26:25.227375 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227678 kubelet[1722]: I1002 19:26:25.227649 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227799 kubelet[1722]: I1002 19:26:25.227706 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227799 kubelet[1722]: I1002 19:26:25.227775 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227942 kubelet[1722]: I1002 19:26:25.227823 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227942 kubelet[1722]: I1002 19:26:25.227867 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.227942 kubelet[1722]: I1002 19:26:25.227918 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/efa388f02b1e876c250d4a065a885d94-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"efa388f02b1e876c250d4a065a885d94\") " pod="kube-system/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.228141 kubelet[1722]: I1002 19:26:25.227959 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.228141 kubelet[1722]: I1002 19:26:25.228000 1722 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.233664 kubelet[1722]: I1002 19:26:25.233566 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.234297 kubelet[1722]: E1002 19:26:25.234215 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.85:6443/api/v1/nodes\": dial tcp 10.128.0.85:6443: connect: connection refused" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.508374 env[1138]: time="2023-10-02T19:26:25.508202001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:08574f7d354540dd2e1c660456e88a19,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:25.511484 env[1138]: time="2023-10-02T19:26:25.511430600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:7f43c7dc3df7bddde5656d8be1e79f36,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:25.522122 kubelet[1722]: E1002 19:26:25.522023 1722 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.85:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:25.525995 env[1138]: time="2023-10-02T19:26:25.525908429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:efa388f02b1e876c250d4a065a885d94,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:25.641300 kubelet[1722]: I1002 19:26:25.641252 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:25.641678 kubelet[1722]: E1002 19:26:25.641641 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.85:6443/api/v1/nodes\": dial tcp 10.128.0.85:6443: connect: connection refused" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:26.077195 kubelet[1722]: W1002 19:26:26.077121 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.077195 kubelet[1722]: E1002 19:26:26.077190 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.229017 kubelet[1722]: W1002 19:26:26.228933 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.229017 kubelet[1722]: E1002 19:26:26.229019 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.286825 kubelet[1722]: W1002 19:26:26.286763 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.286825 kubelet[1722]: E1002 19:26:26.286813 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.322688 kubelet[1722]: E1002 19:26:26.322626 1722 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.85:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.505632 kubelet[1722]: W1002 19:26:26.437061 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.505632 kubelet[1722]: E1002 19:26:26.437191 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:26.505632 kubelet[1722]: I1002 19:26:26.448274 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:26.505632 kubelet[1722]: E1002 19:26:26.448715 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.85:6443/api/v1/nodes\": dial tcp 10.128.0.85:6443: connect: connection refused" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:26.972932 kubelet[1722]: E1002 19:26:26.972879 1722 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.85:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:27.732650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount260002660.mount: Deactivated successfully. Oct 2 19:26:27.741895 env[1138]: time="2023-10-02T19:26:27.741838393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.743538 env[1138]: time="2023-10-02T19:26:27.743466583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.748201 env[1138]: time="2023-10-02T19:26:27.748154922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.750391 env[1138]: time="2023-10-02T19:26:27.750336545Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.752454 env[1138]: time="2023-10-02T19:26:27.752396583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.753609 env[1138]: time="2023-10-02T19:26:27.753556539Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.757096 env[1138]: time="2023-10-02T19:26:27.757016424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.758277 env[1138]: time="2023-10-02T19:26:27.758228075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.759376 env[1138]: time="2023-10-02T19:26:27.759339113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.762477 env[1138]: time="2023-10-02T19:26:27.762419364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.764029 env[1138]: time="2023-10-02T19:26:27.763971315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.766989 env[1138]: time="2023-10-02T19:26:27.766943134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:27.807485 env[1138]: time="2023-10-02T19:26:27.807391719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:27.807485 env[1138]: time="2023-10-02T19:26:27.807447920Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:27.807877 env[1138]: time="2023-10-02T19:26:27.807466313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:27.808297 env[1138]: time="2023-10-02T19:26:27.808228397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c8a39cb52a46f277c37b5b07d2b0f0f21e7b2da5bb94483ac0c4889c9fbb036 pid=1798 runtime=io.containerd.runc.v2 Oct 2 19:26:27.845367 systemd[1]: Started cri-containerd-3c8a39cb52a46f277c37b5b07d2b0f0f21e7b2da5bb94483ac0c4889c9fbb036.scope. Oct 2 19:26:27.858175 env[1138]: time="2023-10-02T19:26:27.852055441Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:27.858175 env[1138]: time="2023-10-02T19:26:27.852207429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:27.858175 env[1138]: time="2023-10-02T19:26:27.852255675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:27.858175 env[1138]: time="2023-10-02T19:26:27.852573869Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/017745b6cd95c63e3aad03ef9a367efe4de705273dc7b1297ce71c156e8f93b0 pid=1831 runtime=io.containerd.runc.v2 Oct 2 19:26:27.905265 kernel: kauditd_printk_skb: 280 callbacks suppressed Oct 2 19:26:27.905473 kernel: audit: type=1400 audit(1696274787.876:643): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.928328 env[1138]: time="2023-10-02T19:26:27.913337782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:27.928328 env[1138]: time="2023-10-02T19:26:27.913475737Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:27.928328 env[1138]: time="2023-10-02T19:26:27.913547066Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:27.928328 env[1138]: time="2023-10-02T19:26:27.913797328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5a8a8cca02f1de125cbb73229f1aecb3ddce633b70edd219f0777273e41a5dd9 pid=1851 runtime=io.containerd.runc.v2 Oct 2 19:26:27.929876 kernel: audit: type=1400 audit(1696274787.876:644): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.929864 systemd[1]: Started cri-containerd-017745b6cd95c63e3aad03ef9a367efe4de705273dc7b1297ce71c156e8f93b0.scope. Oct 2 19:26:27.930238 kubelet[1722]: E1002 19:26:27.929742 1722 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://10.128.0.85:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:27.951611 kernel: audit: type=1400 audit(1696274787.876:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.950516 systemd[1]: Started cri-containerd-5a8a8cca02f1de125cbb73229f1aecb3ddce633b70edd219f0777273e41a5dd9.scope. Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.994850 kernel: audit: type=1400 audit(1696274787.876:646): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.995024 kernel: audit: type=1400 audit(1696274787.876:647): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.022381 kernel: audit: type=1400 audit(1696274787.876:648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.055255 kernel: audit: type=1400 audit(1696274787.876:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.078215 kernel: audit: type=1400 audit(1696274787.876:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079591 kubelet[1722]: W1002 19:26:28.079525 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.080680 kubelet[1722]: E1002 19:26:28.080660 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.85:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.081267 kubelet[1722]: I1002 19:26:28.080578 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:28.081909 kubelet[1722]: E1002 19:26:28.081888 1722 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.85:6443/api/v1/nodes\": dial tcp 10.128.0.85:6443: connect: connection refused" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:28.108958 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:26:28.109159 kernel: audit: type=1400 audit(1696274787.876:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit: BPF prog-id=73 op=LOAD Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386133396362353261343666323737633337623562303764326230 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386133396362353261343666323737633337623562303764326230 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.876000 audit: BPF prog-id=74 op=LOAD Oct 2 19:26:27.876000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c66f0 items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:27.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386133396362353261343666323737633337623562303764326230 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:27.882000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.077000 audit: BPF prog-id=75 op=LOAD Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1831 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373734356236636439356336336533616164303365663961333637 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1831 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373734356236636439356336336533616164303365663961333637 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit: BPF prog-id=76 op=LOAD Oct 2 19:26:28.079000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003961d0 items=0 ppid=1831 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373734356236636439356336336533616164303365663961333637 Oct 2 19:26:28.079000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.108000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.108000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1851 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561386138636361303266316465313235636262373332323966316165 Oct 2 19:26:28.109000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.079000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000396218 items=0 ppid=1831 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373734356236636439356336336533616164303365663961333637 Oct 2 19:26:28.111000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:26:28.111000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { perfmon } for pid=1842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit[1842]: AVC avc: denied { bpf } for pid=1842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.111000 audit: BPF prog-id=80 op=LOAD Oct 2 19:26:28.111000 audit[1842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000396628 items=0 ppid=1831 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031373734356236636439356336336533616164303365663961333637 Oct 2 19:26:28.109000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1851 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561386138636361303266316465313235636262373332323966316165 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit: BPF prog-id=81 op=LOAD Oct 2 19:26:28.114000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003de6f0 items=0 ppid=1851 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561386138636361303266316465313235636262373332323966316165 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit: BPF prog-id=82 op=LOAD Oct 2 19:26:28.114000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003de738 items=0 ppid=1851 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561386138636361303266316465313235636262373332323966316165 Oct 2 19:26:28.114000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:26:28.114000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.114000 audit: BPF prog-id=83 op=LOAD Oct 2 19:26:28.114000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003deb48 items=0 ppid=1851 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561386138636361303266316465313235636262373332323966316165 Oct 2 19:26:27.882000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c6738 items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:27.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386133396362353261343666323737633337623562303764326230 Oct 2 19:26:28.127000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:26:28.127000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.127000 audit: BPF prog-id=84 op=LOAD Oct 2 19:26:28.127000 audit[1808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c6de8 items=0 ppid=1798 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363386133396362353261343666323737633337623562303764326230 Oct 2 19:26:28.167042 env[1138]: time="2023-10-02T19:26:28.166979490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:efa388f02b1e876c250d4a065a885d94,Namespace:kube-system,Attempt:0,} returns sandbox id \"017745b6cd95c63e3aad03ef9a367efe4de705273dc7b1297ce71c156e8f93b0\"" Oct 2 19:26:28.169612 kubelet[1722]: E1002 19:26:28.169574 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-21291" Oct 2 19:26:28.172830 env[1138]: time="2023-10-02T19:26:28.172773287Z" level=info msg="CreateContainer within sandbox \"017745b6cd95c63e3aad03ef9a367efe4de705273dc7b1297ce71c156e8f93b0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:26:28.198284 env[1138]: time="2023-10-02T19:26:28.198206794Z" level=info msg="CreateContainer within sandbox \"017745b6cd95c63e3aad03ef9a367efe4de705273dc7b1297ce71c156e8f93b0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"27910f62f08caafd753494963b42a79b7459c3839dd8c4853b41be6e8f4f98b4\"" Oct 2 19:26:28.199128 env[1138]: time="2023-10-02T19:26:28.199067693Z" level=info msg="StartContainer for \"27910f62f08caafd753494963b42a79b7459c3839dd8c4853b41be6e8f4f98b4\"" Oct 2 19:26:28.216977 env[1138]: time="2023-10-02T19:26:28.216890137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:08574f7d354540dd2e1c660456e88a19,Namespace:kube-system,Attempt:0,} returns sandbox id \"5a8a8cca02f1de125cbb73229f1aecb3ddce633b70edd219f0777273e41a5dd9\"" Oct 2 19:26:28.219687 kubelet[1722]: E1002 19:26:28.219550 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-21291" Oct 2 19:26:28.221810 env[1138]: time="2023-10-02T19:26:28.221748751Z" level=info msg="CreateContainer within sandbox \"5a8a8cca02f1de125cbb73229f1aecb3ddce633b70edd219f0777273e41a5dd9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:26:28.244595 env[1138]: time="2023-10-02T19:26:28.244523544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal,Uid:7f43c7dc3df7bddde5656d8be1e79f36,Namespace:kube-system,Attempt:0,} returns sandbox id \"3c8a39cb52a46f277c37b5b07d2b0f0f21e7b2da5bb94483ac0c4889c9fbb036\"" Oct 2 19:26:28.254358 kubelet[1722]: E1002 19:26:28.248217 1722 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flat" Oct 2 19:26:28.254514 env[1138]: time="2023-10-02T19:26:28.250053322Z" level=info msg="CreateContainer within sandbox \"3c8a39cb52a46f277c37b5b07d2b0f0f21e7b2da5bb94483ac0c4889c9fbb036\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:26:28.258603 env[1138]: time="2023-10-02T19:26:28.258268510Z" level=info msg="CreateContainer within sandbox \"5a8a8cca02f1de125cbb73229f1aecb3ddce633b70edd219f0777273e41a5dd9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"30f6c1b7fd41e11ecf4dca3c59866993e957f7b38ec1316697943c229ca0c8f0\"" Oct 2 19:26:28.259376 env[1138]: time="2023-10-02T19:26:28.259332760Z" level=info msg="StartContainer for \"30f6c1b7fd41e11ecf4dca3c59866993e957f7b38ec1316697943c229ca0c8f0\"" Oct 2 19:26:28.263192 systemd[1]: Started cri-containerd-27910f62f08caafd753494963b42a79b7459c3839dd8c4853b41be6e8f4f98b4.scope. Oct 2 19:26:28.296329 systemd[1]: Started cri-containerd-30f6c1b7fd41e11ecf4dca3c59866993e957f7b38ec1316697943c229ca0c8f0.scope. Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.301000 audit: BPF prog-id=85 op=LOAD Oct 2 19:26:28.302000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.302000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1831 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393130663632663038636161666437353334393439363362343261 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1831 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393130663632663038636161666437353334393439363362343261 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.303000 audit: BPF prog-id=86 op=LOAD Oct 2 19:26:28.303000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002186d0 items=0 ppid=1831 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393130663632663038636161666437353334393439363362343261 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307683 kubelet[1722]: W1002 19:26:28.307513 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.307683 kubelet[1722]: E1002 19:26:28.307609 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.85:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.305000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.305000 audit: BPF prog-id=87 op=LOAD Oct 2 19:26:28.305000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218718 items=0 ppid=1831 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393130663632663038636161666437353334393439363362343261 Oct 2 19:26:28.307000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:26:28.307000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { perfmon } for pid=1921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit[1921]: AVC avc: denied { bpf } for pid=1921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.307000 audit: BPF prog-id=88 op=LOAD Oct 2 19:26:28.307000 audit[1921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218b28 items=0 ppid=1831 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237393130663632663038636161666437353334393439363362343261 Oct 2 19:26:28.321409 env[1138]: time="2023-10-02T19:26:28.321340350Z" level=info msg="CreateContainer within sandbox \"3c8a39cb52a46f277c37b5b07d2b0f0f21e7b2da5bb94483ac0c4889c9fbb036\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"450a795789d675a6f0f4d5047cff427c97a8dcdf5119ef9ff218d8bd09b15d9b\"" Oct 2 19:26:28.322404 env[1138]: time="2023-10-02T19:26:28.322363575Z" level=info msg="StartContainer for \"450a795789d675a6f0f4d5047cff427c97a8dcdf5119ef9ff218d8bd09b15d9b\"" Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.343000 audit: BPF prog-id=89 op=LOAD Oct 2 19:26:28.345000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.345000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1851 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663663316237666434316531316563663464636133633539383636 Oct 2 19:26:28.345000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.345000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1851 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663663316237666434316531316563663464636133633539383636 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.346000 audit: BPF prog-id=90 op=LOAD Oct 2 19:26:28.346000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292580 items=0 ppid=1851 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663663316237666434316531316563663464636133633539383636 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.348000 audit: BPF prog-id=91 op=LOAD Oct 2 19:26:28.348000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002925c8 items=0 ppid=1851 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663663316237666434316531316563663464636133633539383636 Oct 2 19:26:28.353000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:26:28.353000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { perfmon } for pid=1947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit[1947]: AVC avc: denied { bpf } for pid=1947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.353000 audit: BPF prog-id=92 op=LOAD Oct 2 19:26:28.353000 audit[1947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002929d8 items=0 ppid=1851 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663663316237666434316531316563663464636133633539383636 Oct 2 19:26:28.384664 systemd[1]: Started cri-containerd-450a795789d675a6f0f4d5047cff427c97a8dcdf5119ef9ff218d8bd09b15d9b.scope. Oct 2 19:26:28.401875 env[1138]: time="2023-10-02T19:26:28.401807681Z" level=info msg="StartContainer for \"27910f62f08caafd753494963b42a79b7459c3839dd8c4853b41be6e8f4f98b4\" returns successfully" Oct 2 19:26:28.410990 kubelet[1722]: W1002 19:26:28.410836 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.410990 kubelet[1722]: E1002 19:26:28.410943 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.85:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.425000 audit: BPF prog-id=93 op=LOAD Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1798 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435306137393537383964363735613666306634643530343763666634 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1798 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435306137393537383964363735613666306634643530343763666634 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit: BPF prog-id=94 op=LOAD Oct 2 19:26:28.427000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c0090 items=0 ppid=1798 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435306137393537383964363735613666306634643530343763666634 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.427000 audit: BPF prog-id=95 op=LOAD Oct 2 19:26:28.427000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c00d8 items=0 ppid=1798 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435306137393537383964363735613666306634643530343763666634 Oct 2 19:26:28.427000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:26:28.427000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:28.428000 audit: BPF prog-id=96 op=LOAD Oct 2 19:26:28.428000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c04e8 items=0 ppid=1798 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:28.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435306137393537383964363735613666306634643530343763666634 Oct 2 19:26:28.450595 env[1138]: time="2023-10-02T19:26:28.450530543Z" level=info msg="StartContainer for \"30f6c1b7fd41e11ecf4dca3c59866993e957f7b38ec1316697943c229ca0c8f0\" returns successfully" Oct 2 19:26:28.515842 env[1138]: time="2023-10-02T19:26:28.515703352Z" level=info msg="StartContainer for \"450a795789d675a6f0f4d5047cff427c97a8dcdf5119ef9ff218d8bd09b15d9b\" returns successfully" Oct 2 19:26:28.548016 kubelet[1722]: W1002 19:26:28.547862 1722 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:28.548016 kubelet[1722]: E1002 19:26:28.547966 1722 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.85:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.85:6443: connect: connection refused Oct 2 19:26:31.289725 kubelet[1722]: I1002 19:26:31.289690 1722 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:31.868000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.868000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00bc04000 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:31.869000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.869000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c001098040 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.869000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:31.871000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.871000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00bc04120 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.871000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:31.896000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7092 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.896000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00bbccdb0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:31.898000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.898000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c001093be0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.898000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:31.899000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:31.899000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c00bbcd110 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:26:31.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:26:32.107731 kubelet[1722]: I1002 19:26:32.107684 1722 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:32.181636 kubelet[1722]: E1002 19:26:32.181480 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.277760 kubelet[1722]: E1002 19:26:32.277596 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edfb6e1ef7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 900226807, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 900226807, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.282565 kubelet[1722]: E1002 19:26:32.282518 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.383799 kubelet[1722]: E1002 19:26:32.383752 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.403049 kubelet[1722]: E1002 19:26:32.402907 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edfc110e76", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 910904950, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 910904950, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.484837 kubelet[1722]: E1002 19:26:32.484705 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.545667 kubelet[1722]: E1002 19:26:32.545528 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd30490", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973948048, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973948048, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.585538 kubelet[1722]: E1002 19:26:32.585494 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.617493 kubelet[1722]: E1002 19:26:32.617354 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd3230e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973955854, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973955854, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.677266 kubelet[1722]: E1002 19:26:32.677117 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd33533", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973960499, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973960499, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.685738 kubelet[1722]: E1002 19:26:32.685693 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.736039 kubelet[1722]: E1002 19:26:32.735766 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60ee0250a1ee", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 15734766, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 15734766, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.786604 kubelet[1722]: E1002 19:26:32.786510 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.796144 kubelet[1722]: E1002 19:26:32.795957 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd30490", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973948048, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 25179824, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.855722 kubelet[1722]: E1002 19:26:32.855556 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd3230e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973955854, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 25210048, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.887262 kubelet[1722]: E1002 19:26:32.887174 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:32.913927 kubelet[1722]: E1002 19:26:32.913779 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd33533", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973960499, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 25215220, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.973781 kubelet[1722]: E1002 19:26:32.973628 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd30490", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973948048, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 179877411, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:32.988093 kubelet[1722]: E1002 19:26:32.987936 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.088621 kubelet[1722]: E1002 19:26:33.088575 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.156000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:33.189442 kernel: kauditd_printk_skb: 394 callbacks suppressed Oct 2 19:26:33.189648 kernel: audit: type=1400 audit(1696274793.156:746): avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:33.190019 kubelet[1722]: E1002 19:26:33.189941 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.159000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:33.216945 kernel: audit: type=1400 audit(1696274793.159:747): avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:33.159000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00041c740 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:33.159000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:33.281964 kernel: audit: type=1300 audit(1696274793.159:747): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00041c740 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:33.282161 kernel: audit: type=1327 audit(1696274793.159:747): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:33.156000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f08000 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:33.320281 kernel: audit: type=1300 audit(1696274793.156:746): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f08000 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:33.320364 kubelet[1722]: E1002 19:26:33.290220 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:33.335847 kubelet[1722]: E1002 19:26:33.335720 1722 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal.178a60edffd3230e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", UID:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 26, 24, 973955854, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 26, 25, 179893773, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:26:33.352180 kernel: audit: type=1327 audit(1696274793.156:746): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:33.390875 kubelet[1722]: E1002 19:26:33.390832 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.491886 kubelet[1722]: E1002 19:26:33.491830 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.592699 kubelet[1722]: E1002 19:26:33.592636 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.693107 kubelet[1722]: E1002 19:26:33.693030 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.794001 kubelet[1722]: E1002 19:26:33.793922 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.894956 kubelet[1722]: E1002 19:26:33.894792 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:33.995628 kubelet[1722]: E1002 19:26:33.995554 1722 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" not found" Oct 2 19:26:34.362000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7119 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:26:34.398536 kernel: audit: type=1400 audit(1696274794.362:748): avc: denied { watch } for pid=1989 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7119 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:26:34.398744 kernel: audit: type=1300 audit(1696274794.362:748): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc800 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:34.362000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010cc800 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:34.362000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:34.457982 kernel: audit: type=1327 audit(1696274794.362:748): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:34.743839 update_engine[1124]: I1002 19:26:34.743643 1124 update_attempter.cc:505] Updating boot flags... Oct 2 19:26:34.914539 kubelet[1722]: I1002 19:26:34.914176 1722 apiserver.go:52] "Watching apiserver" Oct 2 19:26:34.931033 kubelet[1722]: I1002 19:26:34.927823 1722 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:26:34.965248 kubelet[1722]: I1002 19:26:34.965202 1722 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:26:35.027614 kernel: audit: type=1400 audit(1696274794.999:749): avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:34.999000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:35.019000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:35.019000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0010058c0 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:35.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:35.019000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:35.019000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001005940 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:35.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:35.019000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:26:35.019000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0010059c0 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:35.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:34.999000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f5bba0 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:26:34.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:26:35.101327 systemd[1]: Reloading. Oct 2 19:26:35.245946 /usr/lib/systemd/system-generators/torcx-generator[2065]: time="2023-10-02T19:26:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:26:35.245996 /usr/lib/systemd/system-generators/torcx-generator[2065]: time="2023-10-02T19:26:35Z" level=info msg="torcx already run" Oct 2 19:26:35.373877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:26:35.373904 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:26:35.403556 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.518000 audit: BPF prog-id=97 op=LOAD Oct 2 19:26:35.518000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit: BPF prog-id=98 op=LOAD Oct 2 19:26:35.523000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.524000 audit: BPF prog-id=99 op=LOAD Oct 2 19:26:35.524000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.528000 audit: BPF prog-id=100 op=LOAD Oct 2 19:26:35.528000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.529000 audit: BPF prog-id=101 op=LOAD Oct 2 19:26:35.529000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.530000 audit: BPF prog-id=102 op=LOAD Oct 2 19:26:35.530000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.532000 audit: BPF prog-id=103 op=LOAD Oct 2 19:26:35.532000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit: BPF prog-id=104 op=LOAD Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.533000 audit: BPF prog-id=105 op=LOAD Oct 2 19:26:35.533000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:26:35.533000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.535000 audit: BPF prog-id=106 op=LOAD Oct 2 19:26:35.535000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.536000 audit: BPF prog-id=107 op=LOAD Oct 2 19:26:35.536000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.537000 audit: BPF prog-id=108 op=LOAD Oct 2 19:26:35.537000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit: BPF prog-id=109 op=LOAD Oct 2 19:26:35.538000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit: BPF prog-id=110 op=LOAD Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.539000 audit: BPF prog-id=111 op=LOAD Oct 2 19:26:35.539000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:26:35.539000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.540000 audit: BPF prog-id=112 op=LOAD Oct 2 19:26:35.540000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit: BPF prog-id=113 op=LOAD Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.542000 audit: BPF prog-id=114 op=LOAD Oct 2 19:26:35.542000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:26:35.542000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.544000 audit: BPF prog-id=115 op=LOAD Oct 2 19:26:35.544000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit: BPF prog-id=116 op=LOAD Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.545000 audit: BPF prog-id=117 op=LOAD Oct 2 19:26:35.545000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:26:35.545000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:26:35.578686 kubelet[1722]: I1002 19:26:35.575663 1722 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:26:35.576195 systemd[1]: Stopping kubelet.service... Oct 2 19:26:35.600771 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:26:35.601072 systemd[1]: Stopped kubelet.service. Oct 2 19:26:35.601202 systemd[1]: kubelet.service: Consumed 1.106s CPU time. Oct 2 19:26:35.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:35.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:35.604052 systemd[1]: Started kubelet.service. Oct 2 19:26:35.723681 kubelet[2109]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:35.723681 kubelet[2109]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:35.724253 kubelet[2109]: I1002 19:26:35.723667 2109 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:26:35.728361 kubelet[2109]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:26:35.728361 kubelet[2109]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:26:35.736442 kubelet[2109]: I1002 19:26:35.736389 2109 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:26:35.736442 kubelet[2109]: I1002 19:26:35.736439 2109 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:26:35.736935 kubelet[2109]: I1002 19:26:35.736853 2109 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:26:35.740409 kubelet[2109]: I1002 19:26:35.740372 2109 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:26:35.746268 kubelet[2109]: I1002 19:26:35.746229 2109 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:26:35.771105 kubelet[2109]: I1002 19:26:35.771053 2109 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:26:35.771442 kubelet[2109]: I1002 19:26:35.771401 2109 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:26:35.771552 kubelet[2109]: I1002 19:26:35.771509 2109 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:26:35.771552 kubelet[2109]: I1002 19:26:35.771536 2109 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:26:35.771782 kubelet[2109]: I1002 19:26:35.771556 2109 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:26:35.771782 kubelet[2109]: I1002 19:26:35.771610 2109 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:35.778384 kubelet[2109]: I1002 19:26:35.778353 2109 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:26:35.778384 kubelet[2109]: I1002 19:26:35.778396 2109 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:26:35.778629 kubelet[2109]: I1002 19:26:35.778435 2109 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:26:35.778629 kubelet[2109]: I1002 19:26:35.778457 2109 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:26:35.781807 kubelet[2109]: I1002 19:26:35.781778 2109 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:26:35.806504 kubelet[2109]: I1002 19:26:35.806470 2109 server.go:1186] "Started kubelet" Oct 2 19:26:35.816676 kubelet[2109]: I1002 19:26:35.816643 2109 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:26:35.818156 kubelet[2109]: I1002 19:26:35.818059 2109 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:26:35.819000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:35.819000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e2acf0 a1=c000d4ea50 a2=c000e2acc0 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:35.819000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:35.819000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:35.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:35.819000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d43ee0 a1=c000d4ea68 a2=c000e2ad80 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:35.819000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:35.825210 kubelet[2109]: I1002 19:26:35.820366 2109 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:26:35.825210 kubelet[2109]: I1002 19:26:35.820429 2109 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:26:35.825210 kubelet[2109]: I1002 19:26:35.820461 2109 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:26:35.840944 kubelet[2109]: I1002 19:26:35.833006 2109 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:26:35.840944 kubelet[2109]: I1002 19:26:35.833133 2109 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:26:35.842507 kubelet[2109]: E1002 19:26:35.842473 2109 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:26:35.842507 kubelet[2109]: E1002 19:26:35.842514 2109 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:26:35.947611 kubelet[2109]: I1002 19:26:35.947577 2109 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:26:35.949437 kubelet[2109]: I1002 19:26:35.949409 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:35.981860 kubelet[2109]: I1002 19:26:35.981727 2109 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:35.983226 kubelet[2109]: I1002 19:26:35.982128 2109 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.019211 kubelet[2109]: I1002 19:26:36.019176 2109 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:26:36.019211 kubelet[2109]: I1002 19:26:36.019206 2109 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:26:36.019454 kubelet[2109]: I1002 19:26:36.019228 2109 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:26:36.019454 kubelet[2109]: I1002 19:26:36.019409 2109 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:26:36.019454 kubelet[2109]: I1002 19:26:36.019428 2109 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:26:36.019454 kubelet[2109]: I1002 19:26:36.019439 2109 policy_none.go:49] "None policy: Start" Oct 2 19:26:36.022945 kubelet[2109]: I1002 19:26:36.022910 2109 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:26:36.023174 kubelet[2109]: I1002 19:26:36.023158 2109 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:26:36.023566 kubelet[2109]: I1002 19:26:36.023547 2109 state_mem.go:75] "Updated machine memory state" Oct 2 19:26:36.033000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:36.033000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:26:36.033000 audit[2109]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00134e6f0 a1=c0013646c0 a2=c00134e6c0 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:36.033000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.033140 2109 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.033169 2109 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.033210 2109 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:26:36.038549 kubelet[2109]: E1002 19:26:36.033287 2109 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.034259 2109 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.034347 2109 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:26:36.038549 kubelet[2109]: I1002 19:26:36.037058 2109 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:26:36.133422 kubelet[2109]: I1002 19:26:36.133356 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:36.133652 kubelet[2109]: I1002 19:26:36.133498 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:36.133652 kubelet[2109]: I1002 19:26:36.133603 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:36.238023 kubelet[2109]: I1002 19:26:36.237870 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238023 kubelet[2109]: I1002 19:26:36.237953 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238318 kubelet[2109]: I1002 19:26:36.238036 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238318 kubelet[2109]: I1002 19:26:36.238102 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/efa388f02b1e876c250d4a065a885d94-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"efa388f02b1e876c250d4a065a885d94\") " pod="kube-system/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238318 kubelet[2109]: I1002 19:26:36.238192 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238318 kubelet[2109]: I1002 19:26:36.238236 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238550 kubelet[2109]: I1002 19:26:36.238304 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/08574f7d354540dd2e1c660456e88a19-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"08574f7d354540dd2e1c660456e88a19\") " pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238550 kubelet[2109]: I1002 19:26:36.238389 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.238550 kubelet[2109]: I1002 19:26:36.238530 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7f43c7dc3df7bddde5656d8be1e79f36-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" (UID: \"7f43c7dc3df7bddde5656d8be1e79f36\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:36.778930 kubelet[2109]: I1002 19:26:36.778871 2109 apiserver.go:52] "Watching apiserver" Oct 2 19:26:36.833575 kubelet[2109]: I1002 19:26:36.833520 2109 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:26:36.843056 kubelet[2109]: I1002 19:26:36.842979 2109 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:26:37.137117 kubelet[2109]: E1002 19:26:37.136993 2109 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:37.194463 kubelet[2109]: E1002 19:26:37.194423 2109 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:37.393171 kubelet[2109]: E1002 19:26:37.393018 2109 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:26:38.234816 kubelet[2109]: I1002 19:26:38.234772 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" podStartSLOduration=2.234559637 pod.CreationTimestamp="2023-10-02 19:26:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:37.811899718 +0000 UTC m=+2.196749470" watchObservedRunningTime="2023-10-02 19:26:38.234559637 +0000 UTC m=+2.619409377" Oct 2 19:26:38.235558 kubelet[2109]: I1002 19:26:38.235152 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" podStartSLOduration=2.23511106 pod.CreationTimestamp="2023-10-02 19:26:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:38.235029925 +0000 UTC m=+2.619879677" watchObservedRunningTime="2023-10-02 19:26:38.23511106 +0000 UTC m=+2.619960810" Oct 2 19:26:40.155620 kubelet[2109]: I1002 19:26:40.155568 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" podStartSLOduration=4.155492255 pod.CreationTimestamp="2023-10-02 19:26:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:38.64200263 +0000 UTC m=+3.026852383" watchObservedRunningTime="2023-10-02 19:26:40.155492255 +0000 UTC m=+4.540342005" Oct 2 19:26:40.398646 sudo[1344]: pam_unix(sudo:session): session closed for user root Oct 2 19:26:40.398000 audit[1344]: USER_END pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:40.405101 kernel: kauditd_printk_skb: 269 callbacks suppressed Oct 2 19:26:40.405268 kernel: audit: type=1106 audit(1696274800.398:1002): pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:40.432120 kernel: audit: type=1104 audit(1696274800.398:1003): pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:40.398000 audit[1344]: CRED_DISP pid=1344 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:26:40.455500 sshd[1341]: pam_unix(sshd:session): session closed for user core Oct 2 19:26:40.456000 audit[1341]: USER_END pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:40.460891 systemd[1]: sshd@6-10.128.0.85:22-147.75.109.163:34286.service: Deactivated successfully. Oct 2 19:26:40.462140 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:26:40.462359 systemd[1]: session-7.scope: Consumed 5.657s CPU time. Oct 2 19:26:40.465349 systemd-logind[1123]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:26:40.467447 systemd-logind[1123]: Removed session 7. Oct 2 19:26:40.492178 kernel: audit: type=1106 audit(1696274800.456:1004): pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:40.457000 audit[1341]: CRED_DISP pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:40.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.85:22-147.75.109.163:34286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:40.518251 kernel: audit: type=1104 audit(1696274800.457:1005): pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:26:40.518339 kernel: audit: type=1131 audit(1696274800.460:1006): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.85:22-147.75.109.163:34286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:26:47.179349 kubelet[2109]: I1002 19:26:47.179311 2109 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:26:47.180069 env[1138]: time="2023-10-02T19:26:47.179879139Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:26:47.180531 kubelet[2109]: I1002 19:26:47.180230 2109 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:26:48.040906 kubelet[2109]: I1002 19:26:48.040852 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:48.049815 systemd[1]: Created slice kubepods-besteffort-pod65ffd040_17b8_4b26_a547_b97b23b1b5cc.slice. Oct 2 19:26:48.164051 kubelet[2109]: I1002 19:26:48.163999 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:48.172451 systemd[1]: Created slice kubepods-besteffort-pod0a964e48_da99_4914_800a_d0b2ed7d8c7c.slice. Oct 2 19:26:48.221003 kubelet[2109]: I1002 19:26:48.220952 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x98j2\" (UniqueName: \"kubernetes.io/projected/65ffd040-17b8-4b26-a547-b97b23b1b5cc-kube-api-access-x98j2\") pod \"kube-proxy-kjxwt\" (UID: \"65ffd040-17b8-4b26-a547-b97b23b1b5cc\") " pod="kube-system/kube-proxy-kjxwt" Oct 2 19:26:48.221576 kubelet[2109]: I1002 19:26:48.221021 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/65ffd040-17b8-4b26-a547-b97b23b1b5cc-kube-proxy\") pod \"kube-proxy-kjxwt\" (UID: \"65ffd040-17b8-4b26-a547-b97b23b1b5cc\") " pod="kube-system/kube-proxy-kjxwt" Oct 2 19:26:48.221576 kubelet[2109]: I1002 19:26:48.221054 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/65ffd040-17b8-4b26-a547-b97b23b1b5cc-xtables-lock\") pod \"kube-proxy-kjxwt\" (UID: \"65ffd040-17b8-4b26-a547-b97b23b1b5cc\") " pod="kube-system/kube-proxy-kjxwt" Oct 2 19:26:48.221576 kubelet[2109]: I1002 19:26:48.221101 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/65ffd040-17b8-4b26-a547-b97b23b1b5cc-lib-modules\") pod \"kube-proxy-kjxwt\" (UID: \"65ffd040-17b8-4b26-a547-b97b23b1b5cc\") " pod="kube-system/kube-proxy-kjxwt" Oct 2 19:26:48.321945 kubelet[2109]: I1002 19:26:48.321797 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0a964e48-da99-4914-800a-d0b2ed7d8c7c-var-lib-calico\") pod \"tigera-operator-54b47459dd-ftb2c\" (UID: \"0a964e48-da99-4914-800a-d0b2ed7d8c7c\") " pod="tigera-operator/tigera-operator-54b47459dd-ftb2c" Oct 2 19:26:48.321945 kubelet[2109]: I1002 19:26:48.321865 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lg6bq\" (UniqueName: \"kubernetes.io/projected/0a964e48-da99-4914-800a-d0b2ed7d8c7c-kube-api-access-lg6bq\") pod \"tigera-operator-54b47459dd-ftb2c\" (UID: \"0a964e48-da99-4914-800a-d0b2ed7d8c7c\") " pod="tigera-operator/tigera-operator-54b47459dd-ftb2c" Oct 2 19:26:48.365265 env[1138]: time="2023-10-02T19:26:48.365207763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kjxwt,Uid:65ffd040-17b8-4b26-a547-b97b23b1b5cc,Namespace:kube-system,Attempt:0,}" Oct 2 19:26:48.397414 env[1138]: time="2023-10-02T19:26:48.397301912Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:48.397414 env[1138]: time="2023-10-02T19:26:48.397363129Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:48.397763 env[1138]: time="2023-10-02T19:26:48.397415937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:48.397763 env[1138]: time="2023-10-02T19:26:48.397664971Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3 pid=2215 runtime=io.containerd.runc.v2 Oct 2 19:26:48.431191 systemd[1]: run-containerd-runc-k8s.io-5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3-runc.l0uPqh.mount: Deactivated successfully. Oct 2 19:26:48.440262 systemd[1]: Started cri-containerd-5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3.scope. Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.509149 kernel: audit: type=1400 audit(1696274808.464:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.509347 kernel: audit: type=1400 audit(1696274808.464:1008): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.509947 env[1138]: time="2023-10-02T19:26:48.509891584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-ftb2c,Uid:0a964e48-da99-4914-800a-d0b2ed7d8c7c,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.533616 kernel: audit: type=1400 audit(1696274808.464:1009): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.560170 kernel: audit: type=1400 audit(1696274808.464:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.586140 kernel: audit: type=1400 audit(1696274808.464:1011): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.586277 env[1138]: time="2023-10-02T19:26:48.564740954Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:48.586277 env[1138]: time="2023-10-02T19:26:48.566123925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:48.586277 env[1138]: time="2023-10-02T19:26:48.566185476Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:48.586277 env[1138]: time="2023-10-02T19:26:48.566425349Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/165385ee8311ff908acfe505f1b53edf4ecf7c1112bd46967f4ee05f700d026e pid=2248 runtime=io.containerd.runc.v2 Oct 2 19:26:48.586277 env[1138]: time="2023-10-02T19:26:48.583866963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kjxwt,Uid:65ffd040-17b8-4b26-a547-b97b23b1b5cc,Namespace:kube-system,Attempt:0,} returns sandbox id \"5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3\"" Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.600674 env[1138]: time="2023-10-02T19:26:48.589014812Z" level=info msg="CreateContainer within sandbox \"5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:26:48.606583 systemd[1]: Started cri-containerd-165385ee8311ff908acfe505f1b53edf4ecf7c1112bd46967f4ee05f700d026e.scope. Oct 2 19:26:48.616165 kernel: audit: type=1400 audit(1696274808.464:1012): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.616332 kernel: audit: type=1400 audit(1696274808.464:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.680179 kernel: audit: type=1400 audit(1696274808.464:1014): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.680361 kernel: audit: type=1400 audit(1696274808.464:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.680425 kernel: audit: type=1400 audit(1696274808.464:1016): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.464000 audit: BPF prog-id=118 op=LOAD Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2215 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323666623835663765346463343136343134633036323036653337 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2215 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323666623835663765346463343136343134633036323036653337 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.471000 audit: BPF prog-id=119 op=LOAD Oct 2 19:26:48.471000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000208360 items=0 ppid=2215 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323666623835663765346463343136343134633036323036653337 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit: BPF prog-id=120 op=LOAD Oct 2 19:26:48.508000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002083a8 items=0 ppid=2215 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323666623835663765346463343136343134633036323036653337 Oct 2 19:26:48.508000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:26:48.508000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.508000 audit: BPF prog-id=121 op=LOAD Oct 2 19:26:48.508000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002087b8 items=0 ppid=2215 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323666623835663765346463343136343134633036323036653337 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.656000 audit: BPF prog-id=122 op=LOAD Oct 2 19:26:48.656000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.656000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2248 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353338356565383331316666393038616366653530356631623533 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2248 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353338356565383331316666393038616366653530356631623533 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit: BPF prog-id=123 op=LOAD Oct 2 19:26:48.701000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f7f0 items=0 ppid=2248 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353338356565383331316666393038616366653530356631623533 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit: BPF prog-id=124 op=LOAD Oct 2 19:26:48.701000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f838 items=0 ppid=2248 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353338356565383331316666393038616366653530356631623533 Oct 2 19:26:48.701000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:26:48.701000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.701000 audit: BPF prog-id=125 op=LOAD Oct 2 19:26:48.701000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fc48 items=0 ppid=2248 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353338356565383331316666393038616366653530356631623533 Oct 2 19:26:48.725880 env[1138]: time="2023-10-02T19:26:48.725814256Z" level=info msg="CreateContainer within sandbox \"5426fb85f7e4dc416414c06206e37a8be2c53a8a241a9acc4392b677326b53c3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9e04e977d4b3d7625c99d80d7d2eef4e207da17bd603ce7b3ded045412704858\"" Oct 2 19:26:48.729121 env[1138]: time="2023-10-02T19:26:48.727290645Z" level=info msg="StartContainer for \"9e04e977d4b3d7625c99d80d7d2eef4e207da17bd603ce7b3ded045412704858\"" Oct 2 19:26:48.769371 env[1138]: time="2023-10-02T19:26:48.769309649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-ftb2c,Uid:0a964e48-da99-4914-800a-d0b2ed7d8c7c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"165385ee8311ff908acfe505f1b53edf4ecf7c1112bd46967f4ee05f700d026e\"" Oct 2 19:26:48.776420 systemd[1]: Started cri-containerd-9e04e977d4b3d7625c99d80d7d2eef4e207da17bd603ce7b3ded045412704858.scope. Oct 2 19:26:48.781205 kubelet[2109]: E1002 19:26:48.781134 2109 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:26:48.782670 env[1138]: time="2023-10-02T19:26:48.782614816Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2215 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303465393737643462336437363235633939643830643764326565 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit: BPF prog-id=126 op=LOAD Oct 2 19:26:48.811000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d5f90 items=0 ppid=2215 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303465393737643462336437363235633939643830643764326565 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit: BPF prog-id=127 op=LOAD Oct 2 19:26:48.811000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d5fd8 items=0 ppid=2215 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303465393737643462336437363235633939643830643764326565 Oct 2 19:26:48.811000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:26:48.811000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { perfmon } for pid=2293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit[2293]: AVC avc: denied { bpf } for pid=2293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:48.811000 audit: BPF prog-id=128 op=LOAD Oct 2 19:26:48.811000 audit[2293]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000362068 items=0 ppid=2215 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965303465393737643462336437363235633939643830643764326565 Oct 2 19:26:48.840432 env[1138]: time="2023-10-02T19:26:48.840272629Z" level=info msg="StartContainer for \"9e04e977d4b3d7625c99d80d7d2eef4e207da17bd603ce7b3ded045412704858\" returns successfully" Oct 2 19:26:48.914000 audit[2344]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:48.914000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3cf3ef20 a2=0 a3=7ffc3cf3ef0c items=0 ppid=2306 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:26:48.922000 audit[2345]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:48.922000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0102a550 a2=0 a3=7ffc0102a53c items=0 ppid=2306 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:26:48.924000 audit[2346]: NETFILTER_CFG table=mangle:61 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:48.924000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8f56d5f0 a2=0 a3=7ffe8f56d5dc items=0 ppid=2306 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:26:48.926000 audit[2348]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:48.926000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc3f2b790 a2=0 a3=7ffcc3f2b77c items=0 ppid=2306 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:26:48.937000 audit[2349]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:48.937000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb3d25f40 a2=0 a3=7ffeb3d25f2c items=0 ppid=2306 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:26:48.939000 audit[2350]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:48.939000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9c4304a0 a2=0 a3=7ffe9c43048c items=0 ppid=2306 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:48.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:26:49.019000 audit[2351]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.019000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe981c9a90 a2=0 a3=7ffe981c9a7c items=0 ppid=2306 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:26:49.023000 audit[2353]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.023000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd44a86dd0 a2=0 a3=7ffd44a86dbc items=0 ppid=2306 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:26:49.029000 audit[2356]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.029000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffffaef32a0 a2=0 a3=7ffffaef328c items=0 ppid=2306 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:26:49.031000 audit[2357]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.031000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe397794a0 a2=0 a3=7ffe3977948c items=0 ppid=2306 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:26:49.034000 audit[2359]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.034000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffac55e4a0 a2=0 a3=7fffac55e48c items=0 ppid=2306 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:26:49.036000 audit[2360]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.036000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9c653be0 a2=0 a3=7fff9c653bcc items=0 ppid=2306 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:26:49.042000 audit[2362]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.042000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb1d1fc20 a2=0 a3=7ffeb1d1fc0c items=0 ppid=2306 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:26:49.048000 audit[2365]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.048000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd026c54d0 a2=0 a3=7ffd026c54bc items=0 ppid=2306 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:26:49.050000 audit[2366]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.050000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebcf05f20 a2=0 a3=7ffebcf05f0c items=0 ppid=2306 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:26:49.054000 audit[2368]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.054000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8a626f60 a2=0 a3=7fff8a626f4c items=0 ppid=2306 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:26:49.056000 audit[2369]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.056000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc33ceb1a0 a2=0 a3=7ffc33ceb18c items=0 ppid=2306 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:26:49.060000 audit[2371]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.060000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc20591e10 a2=0 a3=7ffc20591dfc items=0 ppid=2306 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:49.065000 audit[2374]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.065000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc742961d0 a2=0 a3=7ffc742961bc items=0 ppid=2306 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:49.073000 audit[2377]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.073000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce0b0d080 a2=0 a3=7ffce0b0d06c items=0 ppid=2306 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:26:49.075000 audit[2378]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.075000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffb7a3750 a2=0 a3=7ffffb7a373c items=0 ppid=2306 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:26:49.078000 audit[2380]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.078000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd5d052d70 a2=0 a3=7ffd5d052d5c items=0 ppid=2306 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:49.084000 audit[2383]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:26:49.084000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff659cd0e0 a2=0 a3=7fff659cd0cc items=0 ppid=2306 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:49.100000 audit[2387]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:49.100000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffdba1015e0 a2=0 a3=7ffdba1015cc items=0 ppid=2306 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.113000 audit[2387]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:49.113000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdba1015e0 a2=0 a3=7ffdba1015cc items=0 ppid=2306 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.148574 kubelet[2109]: I1002 19:26:49.148530 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kjxwt" podStartSLOduration=1.148477115 pod.CreationTimestamp="2023-10-02 19:26:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:49.147943659 +0000 UTC m=+13.532793409" watchObservedRunningTime="2023-10-02 19:26:49.148477115 +0000 UTC m=+13.533326866" Oct 2 19:26:49.185000 audit[2417]: NETFILTER_CFG table=filter:84 family=2 entries=12 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:49.185000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffdb66873f0 a2=0 a3=7ffdb66873dc items=0 ppid=2306 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.186000 audit[2417]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:49.186000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdb66873f0 a2=0 a3=7ffdb66873dc items=0 ppid=2306 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.194000 audit[2418]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.194000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff290ecce0 a2=0 a3=7fff290ecccc items=0 ppid=2306 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:26:49.199000 audit[2420]: NETFILTER_CFG table=filter:87 family=10 entries=2 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.199000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcaf6dd380 a2=0 a3=7ffcaf6dd36c items=0 ppid=2306 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:26:49.206000 audit[2423]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.206000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeef257ab0 a2=0 a3=7ffeef257a9c items=0 ppid=2306 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:26:49.208000 audit[2424]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.208000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6b358740 a2=0 a3=7fff6b35872c items=0 ppid=2306 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:26:49.213000 audit[2426]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.213000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd593b0b60 a2=0 a3=7ffd593b0b4c items=0 ppid=2306 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:26:49.215000 audit[2427]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.215000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecbe40540 a2=0 a3=7ffecbe4052c items=0 ppid=2306 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:26:49.220000 audit[2429]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.220000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc773d01a0 a2=0 a3=7ffc773d018c items=0 ppid=2306 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:26:49.228000 audit[2432]: NETFILTER_CFG table=filter:93 family=10 entries=2 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.228000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd795df850 a2=0 a3=7ffd795df83c items=0 ppid=2306 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:26:49.230000 audit[2433]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.230000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe70f61300 a2=0 a3=7ffe70f612ec items=0 ppid=2306 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:26:49.234000 audit[2435]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.234000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd5172340 a2=0 a3=7ffdd517232c items=0 ppid=2306 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:26:49.236000 audit[2436]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.236000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff09a395c0 a2=0 a3=7fff09a395ac items=0 ppid=2306 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:26:49.241000 audit[2438]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.241000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff582f3130 a2=0 a3=7fff582f311c items=0 ppid=2306 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:26:49.246000 audit[2441]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.246000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd02102000 a2=0 a3=7ffd02101fec items=0 ppid=2306 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:26:49.253000 audit[2444]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.253000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8463c740 a2=0 a3=7ffc8463c72c items=0 ppid=2306 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:26:49.255000 audit[2445]: NETFILTER_CFG table=nat:100 family=10 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.255000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe070b680 a2=0 a3=7fffe070b66c items=0 ppid=2306 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:26:49.259000 audit[2447]: NETFILTER_CFG table=nat:101 family=10 entries=2 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.259000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd7c677b50 a2=0 a3=7ffd7c677b3c items=0 ppid=2306 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:49.264000 audit[2450]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:26:49.264000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffded1b2ab0 a2=0 a3=7ffded1b2a9c items=0 ppid=2306 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:26:49.271000 audit[2454]: NETFILTER_CFG table=filter:103 family=10 entries=3 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:26:49.271000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffb7bbbab0 a2=0 a3=7fffb7bbba9c items=0 ppid=2306 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.271000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.272000 audit[2454]: NETFILTER_CFG table=nat:104 family=10 entries=10 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:26:49.272000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fffb7bbbab0 a2=0 a3=7fffb7bbba9c items=0 ppid=2306 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:49.272000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:49.726449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount510943900.mount: Deactivated successfully. Oct 2 19:26:50.933796 env[1138]: time="2023-10-02T19:26:50.933723426Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:50.937748 env[1138]: time="2023-10-02T19:26:50.937689812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:50.940821 env[1138]: time="2023-10-02T19:26:50.940767478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:50.943704 env[1138]: time="2023-10-02T19:26:50.943648764Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:50.945919 env[1138]: time="2023-10-02T19:26:50.945044200Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:26:50.950750 env[1138]: time="2023-10-02T19:26:50.950681410Z" level=info msg="CreateContainer within sandbox \"165385ee8311ff908acfe505f1b53edf4ecf7c1112bd46967f4ee05f700d026e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:26:50.974375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2655803059.mount: Deactivated successfully. Oct 2 19:26:50.981107 env[1138]: time="2023-10-02T19:26:50.981011339Z" level=info msg="CreateContainer within sandbox \"165385ee8311ff908acfe505f1b53edf4ecf7c1112bd46967f4ee05f700d026e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c29a2702c0af347bc68eb7f8329ed12a592f7239297ec2a8adf67dc64d94ebd8\"" Oct 2 19:26:50.983795 env[1138]: time="2023-10-02T19:26:50.981961763Z" level=info msg="StartContainer for \"c29a2702c0af347bc68eb7f8329ed12a592f7239297ec2a8adf67dc64d94ebd8\"" Oct 2 19:26:51.016637 systemd[1]: run-containerd-runc-k8s.io-c29a2702c0af347bc68eb7f8329ed12a592f7239297ec2a8adf67dc64d94ebd8-runc.SgJnFC.mount: Deactivated successfully. Oct 2 19:26:51.020532 systemd[1]: Started cri-containerd-c29a2702c0af347bc68eb7f8329ed12a592f7239297ec2a8adf67dc64d94ebd8.scope. Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.043000 audit: BPF prog-id=129 op=LOAD Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2248 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:51.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396132373032633061663334376263363865623766383332396564 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2248 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:51.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396132373032633061663334376263363865623766383332396564 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.044000 audit: BPF prog-id=130 op=LOAD Oct 2 19:26:51.044000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000299d20 items=0 ppid=2248 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:51.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396132373032633061663334376263363865623766383332396564 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit: BPF prog-id=131 op=LOAD Oct 2 19:26:51.046000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000299d68 items=0 ppid=2248 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:51.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396132373032633061663334376263363865623766383332396564 Oct 2 19:26:51.046000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:26:51.046000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:51.046000 audit: BPF prog-id=132 op=LOAD Oct 2 19:26:51.046000 audit[2463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2178 items=0 ppid=2248 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:51.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332396132373032633061663334376263363865623766383332396564 Oct 2 19:26:51.078911 env[1138]: time="2023-10-02T19:26:51.078826580Z" level=info msg="StartContainer for \"c29a2702c0af347bc68eb7f8329ed12a592f7239297ec2a8adf67dc64d94ebd8\" returns successfully" Oct 2 19:26:51.156375 kubelet[2109]: I1002 19:26:51.156340 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-ftb2c" podStartSLOduration=-9.223372033698484e+09 pod.CreationTimestamp="2023-10-02 19:26:48 +0000 UTC" firstStartedPulling="2023-10-02 19:26:48.771932685 +0000 UTC m=+13.156782411" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:51.155241647 +0000 UTC m=+15.540091401" watchObservedRunningTime="2023-10-02 19:26:51.156291109 +0000 UTC m=+15.541140859" Oct 2 19:26:53.259000 audit[2518]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=2518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:53.259000 audit[2518]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd018f2aa0 a2=0 a3=7ffd018f2a8c items=0 ppid=2306 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:53.261000 audit[2518]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2518 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:53.261000 audit[2518]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd018f2aa0 a2=0 a3=7ffd018f2a8c items=0 ppid=2306 pid=2518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:53.325000 audit[2544]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:53.325000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffda4f05010 a2=0 a3=7ffda4f04ffc items=0 ppid=2306 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:53.327000 audit[2544]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:53.327000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffda4f05010 a2=0 a3=7ffda4f04ffc items=0 ppid=2306 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:53.460737 kubelet[2109]: I1002 19:26:53.460658 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:53.469876 kubelet[2109]: I1002 19:26:53.468932 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dwvx2\" (UniqueName: \"kubernetes.io/projected/68a69b79-3752-4723-8481-c45d32eb16a9-kube-api-access-dwvx2\") pod \"calico-typha-85cb979485-phgrp\" (UID: \"68a69b79-3752-4723-8481-c45d32eb16a9\") " pod="calico-system/calico-typha-85cb979485-phgrp" Oct 2 19:26:53.469876 kubelet[2109]: I1002 19:26:53.469044 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/68a69b79-3752-4723-8481-c45d32eb16a9-tigera-ca-bundle\") pod \"calico-typha-85cb979485-phgrp\" (UID: \"68a69b79-3752-4723-8481-c45d32eb16a9\") " pod="calico-system/calico-typha-85cb979485-phgrp" Oct 2 19:26:53.469876 kubelet[2109]: I1002 19:26:53.469140 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/68a69b79-3752-4723-8481-c45d32eb16a9-typha-certs\") pod \"calico-typha-85cb979485-phgrp\" (UID: \"68a69b79-3752-4723-8481-c45d32eb16a9\") " pod="calico-system/calico-typha-85cb979485-phgrp" Oct 2 19:26:53.469628 systemd[1]: Created slice kubepods-besteffort-pod68a69b79_3752_4723_8481_c45d32eb16a9.slice. Oct 2 19:26:53.616300 kubelet[2109]: I1002 19:26:53.616257 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:26:53.623334 kubelet[2109]: W1002 19:26:53.623283 2109 reflector.go:424] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:26:53.623697 kubelet[2109]: E1002 19:26:53.623675 2109 reflector.go:140] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:26:53.623879 kubelet[2109]: W1002 19:26:53.623613 2109 reflector.go:424] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:26:53.624022 kubelet[2109]: E1002 19:26:53.624006 2109 reflector.go:140] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:26:53.626360 systemd[1]: Created slice kubepods-besteffort-podd2eb1e61_bf62_4ecc_aa61_1632677a054a.slice. Oct 2 19:26:53.670809 kubelet[2109]: I1002 19:26:53.670758 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-xtables-lock\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.670809 kubelet[2109]: I1002 19:26:53.670819 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-cni-log-dir\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671148 kubelet[2109]: I1002 19:26:53.670851 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-cni-net-dir\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671148 kubelet[2109]: I1002 19:26:53.670880 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2eb1e61-bf62-4ecc-aa61-1632677a054a-node-certs\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671148 kubelet[2109]: I1002 19:26:53.670915 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-lib-modules\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671148 kubelet[2109]: I1002 19:26:53.670951 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-flexvol-driver-host\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671148 kubelet[2109]: I1002 19:26:53.670987 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lqdt8\" (UniqueName: \"kubernetes.io/projected/d2eb1e61-bf62-4ecc-aa61-1632677a054a-kube-api-access-lqdt8\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671428 kubelet[2109]: I1002 19:26:53.671018 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-policysync\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671428 kubelet[2109]: I1002 19:26:53.671050 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2eb1e61-bf62-4ecc-aa61-1632677a054a-tigera-ca-bundle\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671428 kubelet[2109]: I1002 19:26:53.671158 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-var-run-calico\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671428 kubelet[2109]: I1002 19:26:53.671220 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-var-lib-calico\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.671428 kubelet[2109]: I1002 19:26:53.671271 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2eb1e61-bf62-4ecc-aa61-1632677a054a-cni-bin-dir\") pod \"calico-node-f9x2h\" (UID: \"d2eb1e61-bf62-4ecc-aa61-1632677a054a\") " pod="calico-system/calico-node-f9x2h" Oct 2 19:26:53.775584 env[1138]: time="2023-10-02T19:26:53.775514874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85cb979485-phgrp,Uid:68a69b79-3752-4723-8481-c45d32eb16a9,Namespace:calico-system,Attempt:0,}" Oct 2 19:26:53.776487 kubelet[2109]: E1002 19:26:53.776447 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.776487 kubelet[2109]: W1002 19:26:53.776476 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.776722 kubelet[2109]: E1002 19:26:53.776521 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.777089 kubelet[2109]: E1002 19:26:53.777056 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.777217 kubelet[2109]: W1002 19:26:53.777095 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.777289 kubelet[2109]: E1002 19:26:53.777221 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.777436 kubelet[2109]: E1002 19:26:53.777415 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.777535 kubelet[2109]: W1002 19:26:53.777486 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.778559 kubelet[2109]: E1002 19:26:53.778505 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.778864 kubelet[2109]: E1002 19:26:53.778840 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.778864 kubelet[2109]: W1002 19:26:53.778863 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.779956 kubelet[2109]: E1002 19:26:53.779930 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.780199 kubelet[2109]: E1002 19:26:53.780168 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.780199 kubelet[2109]: W1002 19:26:53.780188 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.780832 kubelet[2109]: E1002 19:26:53.780785 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.781044 kubelet[2109]: E1002 19:26:53.781022 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.781044 kubelet[2109]: W1002 19:26:53.781040 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.781229 kubelet[2109]: E1002 19:26:53.781133 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.781557 kubelet[2109]: E1002 19:26:53.781531 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.781557 kubelet[2109]: W1002 19:26:53.781555 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.781730 kubelet[2109]: E1002 19:26:53.781673 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.781925 kubelet[2109]: E1002 19:26:53.781903 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.781925 kubelet[2109]: W1002 19:26:53.781924 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.782520 kubelet[2109]: E1002 19:26:53.782039 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.782749 kubelet[2109]: E1002 19:26:53.782716 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.782749 kubelet[2109]: W1002 19:26:53.782736 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.782884 kubelet[2109]: E1002 19:26:53.782853 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.783092 kubelet[2109]: E1002 19:26:53.783053 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.783265 kubelet[2109]: W1002 19:26:53.783073 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.783265 kubelet[2109]: E1002 19:26:53.783236 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.783591 kubelet[2109]: E1002 19:26:53.783460 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.783591 kubelet[2109]: W1002 19:26:53.783474 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.783778 kubelet[2109]: E1002 19:26:53.783619 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.783837 kubelet[2109]: E1002 19:26:53.783814 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.783837 kubelet[2109]: W1002 19:26:53.783825 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.783951 kubelet[2109]: E1002 19:26:53.783933 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.784205 kubelet[2109]: E1002 19:26:53.784164 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.784205 kubelet[2109]: W1002 19:26:53.784183 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.784343 kubelet[2109]: E1002 19:26:53.784298 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.784520 kubelet[2109]: E1002 19:26:53.784495 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.784520 kubelet[2109]: W1002 19:26:53.784517 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.784848 kubelet[2109]: E1002 19:26:53.784630 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.784909 kubelet[2109]: E1002 19:26:53.784884 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.784909 kubelet[2109]: W1002 19:26:53.784897 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.785011 kubelet[2109]: E1002 19:26:53.785004 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.785297 kubelet[2109]: E1002 19:26:53.785249 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.785297 kubelet[2109]: W1002 19:26:53.785295 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.785476 kubelet[2109]: E1002 19:26:53.785436 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.785664 kubelet[2109]: E1002 19:26:53.785641 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.785664 kubelet[2109]: W1002 19:26:53.785663 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.785801 kubelet[2109]: E1002 19:26:53.785686 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.786285 kubelet[2109]: E1002 19:26:53.786262 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.786285 kubelet[2109]: W1002 19:26:53.786282 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.786446 kubelet[2109]: E1002 19:26:53.786308 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.787380 kubelet[2109]: E1002 19:26:53.787354 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.787380 kubelet[2109]: W1002 19:26:53.787377 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.787535 kubelet[2109]: E1002 19:26:53.787409 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.789370 kubelet[2109]: E1002 19:26:53.789341 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.789370 kubelet[2109]: W1002 19:26:53.789366 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.789551 kubelet[2109]: E1002 19:26:53.789392 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.789854 kubelet[2109]: E1002 19:26:53.789830 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.789854 kubelet[2109]: W1002 19:26:53.789851 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.789983 kubelet[2109]: E1002 19:26:53.789871 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.808668 env[1138]: time="2023-10-02T19:26:53.808573659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:53.808984 env[1138]: time="2023-10-02T19:26:53.808932720Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:53.809179 env[1138]: time="2023-10-02T19:26:53.809139204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:53.809557 env[1138]: time="2023-10-02T19:26:53.809519086Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b64e1bc04b9fc43114709a9e29dec8801c5c117d6824e1f75bdd83e1d56fc9f5 pid=2576 runtime=io.containerd.runc.v2 Oct 2 19:26:53.837590 kubelet[2109]: E1002 19:26:53.837541 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.837590 kubelet[2109]: W1002 19:26:53.837571 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.837590 kubelet[2109]: E1002 19:26:53.837600 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.874865 systemd[1]: Started cri-containerd-b64e1bc04b9fc43114709a9e29dec8801c5c117d6824e1f75bdd83e1d56fc9f5.scope. Oct 2 19:26:53.876166 kubelet[2109]: E1002 19:26:53.875294 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:53.876166 kubelet[2109]: W1002 19:26:53.875316 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:53.876166 kubelet[2109]: E1002 19:26:53.875346 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.950142 kernel: kauditd_printk_skb: 354 callbacks suppressed Oct 2 19:26:53.950336 kernel: audit: type=1400 audit(1696274813.933:1117): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.983769 kernel: audit: type=1400 audit(1696274813.933:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.015137 kernel: audit: type=1400 audit(1696274813.933:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.015432 kubelet[2109]: E1002 19:26:54.006379 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.015432 kubelet[2109]: W1002 19:26:54.006401 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.015432 kubelet[2109]: E1002 19:26:54.006438 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.050506 kernel: audit: type=1400 audit(1696274813.933:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.076824 env[1138]: time="2023-10-02T19:26:54.076765390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-85cb979485-phgrp,Uid:68a69b79-3752-4723-8481-c45d32eb16a9,Namespace:calico-system,Attempt:0,} returns sandbox id \"b64e1bc04b9fc43114709a9e29dec8801c5c117d6824e1f75bdd83e1d56fc9f5\"" Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.079801 env[1138]: time="2023-10-02T19:26:54.079757230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:26:54.099711 kernel: audit: type=1400 audit(1696274813.933:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.099859 kernel: audit: type=1400 audit(1696274813.933:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.101043 kernel: audit: type=1400 audit(1696274813.933:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.108383 kubelet[2109]: E1002 19:26:54.108267 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.108383 kubelet[2109]: W1002 19:26:54.108292 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.108383 kubelet[2109]: E1002 19:26:54.108324 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.145104 kernel: audit: type=1400 audit(1696274813.933:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.189477 kernel: audit: type=1400 audit(1696274813.933:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.189666 kernel: audit: type=1400 audit(1696274813.934:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.934000 audit: BPF prog-id=133 op=LOAD Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2576 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346531626330346239666334333131343730396139653239646563 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2576 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346531626330346239666334333131343730396139653239646563 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:53.951000 audit: BPF prog-id=134 op=LOAD Oct 2 19:26:53.951000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000248140 items=0 ppid=2576 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:53.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346531626330346239666334333131343730396139653239646563 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.006000 audit: BPF prog-id=135 op=LOAD Oct 2 19:26:54.006000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000248188 items=0 ppid=2576 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:54.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346531626330346239666334333131343730396139653239646563 Oct 2 19:26:54.007000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:26:54.007000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:54.007000 audit: BPF prog-id=136 op=LOAD Oct 2 19:26:54.007000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000248598 items=0 ppid=2576 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:54.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236346531626330346239666334333131343730396139653239646563 Oct 2 19:26:54.209467 kubelet[2109]: E1002 19:26:54.209417 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.209467 kubelet[2109]: W1002 19:26:54.209450 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.209708 kubelet[2109]: E1002 19:26:54.209485 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.310175 kubelet[2109]: E1002 19:26:54.310135 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.310175 kubelet[2109]: W1002 19:26:54.310168 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.310468 kubelet[2109]: E1002 19:26:54.310199 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.411631 kubelet[2109]: E1002 19:26:54.411436 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.411631 kubelet[2109]: W1002 19:26:54.411460 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.411631 kubelet[2109]: E1002 19:26:54.411487 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.428000 audit[2642]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:54.428000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd25cd4f30 a2=0 a3=7ffd25cd4f1c items=0 ppid=2306 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:54.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:54.430000 audit[2642]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:54.430000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd25cd4f30 a2=0 a3=7ffd25cd4f1c items=0 ppid=2306 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:54.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:54.512326 kubelet[2109]: E1002 19:26:54.512289 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.512326 kubelet[2109]: W1002 19:26:54.512320 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.512914 kubelet[2109]: E1002 19:26:54.512350 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.613222 kubelet[2109]: E1002 19:26:54.613183 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.613222 kubelet[2109]: W1002 19:26:54.613216 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.613222 kubelet[2109]: E1002 19:26:54.613247 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.714625 kubelet[2109]: E1002 19:26:54.714506 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.714868 kubelet[2109]: W1002 19:26:54.714841 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.715026 kubelet[2109]: E1002 19:26:54.715008 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.773554 kubelet[2109]: E1002 19:26:54.773513 2109 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 19:26:54.773908 kubelet[2109]: E1002 19:26:54.773887 2109 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d2eb1e61-bf62-4ecc-aa61-1632677a054a-node-certs podName:d2eb1e61-bf62-4ecc-aa61-1632677a054a nodeName:}" failed. No retries permitted until 2023-10-02 19:26:55.273859504 +0000 UTC m=+19.658709242 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/d2eb1e61-bf62-4ecc-aa61-1632677a054a-node-certs") pod "calico-node-f9x2h" (UID: "d2eb1e61-bf62-4ecc-aa61-1632677a054a") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:26:54.816347 kubelet[2109]: E1002 19:26:54.816314 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.816587 kubelet[2109]: W1002 19:26:54.816558 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.816773 kubelet[2109]: E1002 19:26:54.816721 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:54.918301 kubelet[2109]: E1002 19:26:54.918250 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:54.918301 kubelet[2109]: W1002 19:26:54.918279 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:54.918301 kubelet[2109]: E1002 19:26:54.918308 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.020125 kubelet[2109]: E1002 19:26:55.019906 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.020125 kubelet[2109]: W1002 19:26:55.019934 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.020125 kubelet[2109]: E1002 19:26:55.019987 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.121595 kubelet[2109]: E1002 19:26:55.121483 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.121595 kubelet[2109]: W1002 19:26:55.121510 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.121595 kubelet[2109]: E1002 19:26:55.121541 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.130043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount853767418.mount: Deactivated successfully. Oct 2 19:26:55.223253 kubelet[2109]: E1002 19:26:55.223214 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.223253 kubelet[2109]: W1002 19:26:55.223245 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.223538 kubelet[2109]: E1002 19:26:55.223273 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.324429 kubelet[2109]: E1002 19:26:55.324392 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.324429 kubelet[2109]: W1002 19:26:55.324421 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.324429 kubelet[2109]: E1002 19:26:55.324450 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.324959 kubelet[2109]: E1002 19:26:55.324918 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.324959 kubelet[2109]: W1002 19:26:55.324940 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.325165 kubelet[2109]: E1002 19:26:55.324964 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.326146 kubelet[2109]: E1002 19:26:55.325386 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.326146 kubelet[2109]: W1002 19:26:55.325404 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.326146 kubelet[2109]: E1002 19:26:55.325426 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.326146 kubelet[2109]: E1002 19:26:55.325773 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.326146 kubelet[2109]: W1002 19:26:55.325787 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.326146 kubelet[2109]: E1002 19:26:55.325818 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.326562 kubelet[2109]: E1002 19:26:55.326188 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.326562 kubelet[2109]: W1002 19:26:55.326202 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.326562 kubelet[2109]: E1002 19:26:55.326222 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.336461 kubelet[2109]: E1002 19:26:55.336432 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:55.336693 kubelet[2109]: W1002 19:26:55.336670 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:55.336826 kubelet[2109]: E1002 19:26:55.336810 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:55.432937 env[1138]: time="2023-10-02T19:26:55.432875052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f9x2h,Uid:d2eb1e61-bf62-4ecc-aa61-1632677a054a,Namespace:calico-system,Attempt:0,}" Oct 2 19:26:55.483430 env[1138]: time="2023-10-02T19:26:55.483256219Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:26:55.483430 env[1138]: time="2023-10-02T19:26:55.483334547Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:26:55.483430 env[1138]: time="2023-10-02T19:26:55.483354983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:26:55.484001 env[1138]: time="2023-10-02T19:26:55.483916680Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d pid=2665 runtime=io.containerd.runc.v2 Oct 2 19:26:55.517353 systemd[1]: Started cri-containerd-81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d.scope. Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.554000 audit: BPF prog-id=137 op=LOAD Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:55.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653739643230326235393235313963646164373938633064616633 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:55.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653739643230326235393235313963646164373938633064616633 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit: BPF prog-id=138 op=LOAD Oct 2 19:26:55.555000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000284ba0 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:55.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653739643230326235393235313963646164373938633064616633 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit: BPF prog-id=139 op=LOAD Oct 2 19:26:55.555000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000284be8 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:55.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653739643230326235393235313963646164373938633064616633 Oct 2 19:26:55.555000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:26:55.555000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:55.555000 audit: BPF prog-id=140 op=LOAD Oct 2 19:26:55.555000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000284ff8 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:55.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831653739643230326235393235313963646164373938633064616633 Oct 2 19:26:55.590651 env[1138]: time="2023-10-02T19:26:55.590476069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f9x2h,Uid:d2eb1e61-bf62-4ecc-aa61-1632677a054a,Namespace:calico-system,Attempt:0,} returns sandbox id \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\"" Oct 2 19:26:56.572342 env[1138]: time="2023-10-02T19:26:56.572249785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:56.575823 env[1138]: time="2023-10-02T19:26:56.575755431Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:56.578914 env[1138]: time="2023-10-02T19:26:56.578861360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:56.582071 env[1138]: time="2023-10-02T19:26:56.582005665Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:56.583360 env[1138]: time="2023-10-02T19:26:56.583305493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:26:56.587681 env[1138]: time="2023-10-02T19:26:56.584717278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:26:56.588980 env[1138]: time="2023-10-02T19:26:56.588536969Z" level=info msg="CreateContainer within sandbox \"b64e1bc04b9fc43114709a9e29dec8801c5c117d6824e1f75bdd83e1d56fc9f5\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:26:56.612972 env[1138]: time="2023-10-02T19:26:56.612886586Z" level=info msg="CreateContainer within sandbox \"b64e1bc04b9fc43114709a9e29dec8801c5c117d6824e1f75bdd83e1d56fc9f5\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0ed6d4f530f179bd49bdfa2164b18177c0bfc43e6b485109b351ca63ddaa72b1\"" Oct 2 19:26:56.615771 env[1138]: time="2023-10-02T19:26:56.614157664Z" level=info msg="StartContainer for \"0ed6d4f530f179bd49bdfa2164b18177c0bfc43e6b485109b351ca63ddaa72b1\"" Oct 2 19:26:56.655729 systemd[1]: Started cri-containerd-0ed6d4f530f179bd49bdfa2164b18177c0bfc43e6b485109b351ca63ddaa72b1.scope. Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.680000 audit: BPF prog-id=141 op=LOAD Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2576 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643664346635333066313739626434396264666132313634623138 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2576 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643664346635333066313739626434396264666132313634623138 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit: BPF prog-id=142 op=LOAD Oct 2 19:26:56.681000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018fb80 items=0 ppid=2576 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643664346635333066313739626434396264666132313634623138 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit: BPF prog-id=143 op=LOAD Oct 2 19:26:56.681000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018fbc8 items=0 ppid=2576 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643664346635333066313739626434396264666132313634623138 Oct 2 19:26:56.681000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:26:56.681000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:56.681000 audit: BPF prog-id=144 op=LOAD Oct 2 19:26:56.681000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018ffd8 items=0 ppid=2576 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:56.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065643664346635333066313739626434396264666132313634623138 Oct 2 19:26:56.710309 env[1138]: time="2023-10-02T19:26:56.710245652Z" level=info msg="StartContainer for \"0ed6d4f530f179bd49bdfa2164b18177c0bfc43e6b485109b351ca63ddaa72b1\" returns successfully" Oct 2 19:26:57.172302 kubelet[2109]: I1002 19:26:57.172263 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-85cb979485-phgrp" podStartSLOduration=-9.223372032682579e+09 pod.CreationTimestamp="2023-10-02 19:26:53 +0000 UTC" firstStartedPulling="2023-10-02 19:26:54.079017061 +0000 UTC m=+18.463866803" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:26:57.170362687 +0000 UTC m=+21.555212436" watchObservedRunningTime="2023-10-02 19:26:57.172197501 +0000 UTC m=+21.557047252" Oct 2 19:26:57.209806 kubelet[2109]: E1002 19:26:57.209770 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.210059 kubelet[2109]: W1002 19:26:57.210033 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.210214 kubelet[2109]: E1002 19:26:57.210194 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.211725 kubelet[2109]: E1002 19:26:57.211696 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.211912 kubelet[2109]: W1002 19:26:57.211891 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.212059 kubelet[2109]: E1002 19:26:57.212042 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.212590 kubelet[2109]: E1002 19:26:57.212568 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.212755 kubelet[2109]: W1002 19:26:57.212736 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.212863 kubelet[2109]: E1002 19:26:57.212849 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.213354 kubelet[2109]: E1002 19:26:57.213334 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.213486 kubelet[2109]: W1002 19:26:57.213468 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.213591 kubelet[2109]: E1002 19:26:57.213577 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.214125 kubelet[2109]: E1002 19:26:57.214106 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.214263 kubelet[2109]: W1002 19:26:57.214244 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.214373 kubelet[2109]: E1002 19:26:57.214358 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.215722 kubelet[2109]: E1002 19:26:57.215700 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.215825 kubelet[2109]: W1002 19:26:57.215809 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.215898 kubelet[2109]: E1002 19:26:57.215888 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.216377 kubelet[2109]: E1002 19:26:57.216359 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.216493 kubelet[2109]: W1002 19:26:57.216478 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.216608 kubelet[2109]: E1002 19:26:57.216595 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.217002 kubelet[2109]: E1002 19:26:57.216985 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.217148 kubelet[2109]: W1002 19:26:57.217130 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.217267 kubelet[2109]: E1002 19:26:57.217252 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.217851 kubelet[2109]: E1002 19:26:57.217831 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.217979 kubelet[2109]: W1002 19:26:57.217959 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.218152 kubelet[2109]: E1002 19:26:57.218136 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.218602 kubelet[2109]: E1002 19:26:57.218585 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.218742 kubelet[2109]: W1002 19:26:57.218722 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.218852 kubelet[2109]: E1002 19:26:57.218838 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.219332 kubelet[2109]: E1002 19:26:57.219315 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.219459 kubelet[2109]: W1002 19:26:57.219442 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.219589 kubelet[2109]: E1002 19:26:57.219573 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.219962 kubelet[2109]: E1002 19:26:57.219946 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.220093 kubelet[2109]: W1002 19:26:57.220065 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.220204 kubelet[2109]: E1002 19:26:57.220190 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.236532 kubelet[2109]: E1002 19:26:57.236485 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.236532 kubelet[2109]: W1002 19:26:57.236524 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.236795 kubelet[2109]: E1002 19:26:57.236556 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.237707 kubelet[2109]: E1002 19:26:57.237677 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.237707 kubelet[2109]: W1002 19:26:57.237703 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.237916 kubelet[2109]: E1002 19:26:57.237735 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.238336 kubelet[2109]: E1002 19:26:57.238309 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.238336 kubelet[2109]: W1002 19:26:57.238333 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.238516 kubelet[2109]: E1002 19:26:57.238472 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.238831 kubelet[2109]: E1002 19:26:57.238807 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.238831 kubelet[2109]: W1002 19:26:57.238828 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.238984 kubelet[2109]: E1002 19:26:57.238961 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.239373 kubelet[2109]: E1002 19:26:57.239352 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.239530 kubelet[2109]: W1002 19:26:57.239509 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.239668 kubelet[2109]: E1002 19:26:57.239651 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.240167 kubelet[2109]: E1002 19:26:57.240138 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.240288 kubelet[2109]: W1002 19:26:57.240263 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.240380 kubelet[2109]: E1002 19:26:57.240365 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.240955 kubelet[2109]: E1002 19:26:57.240934 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.241152 kubelet[2109]: W1002 19:26:57.241128 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.241295 kubelet[2109]: E1002 19:26:57.241278 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.243230 kubelet[2109]: E1002 19:26:57.243209 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.243341 kubelet[2109]: W1002 19:26:57.243326 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.243426 kubelet[2109]: E1002 19:26:57.243415 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.243860 kubelet[2109]: E1002 19:26:57.243840 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.243980 kubelet[2109]: W1002 19:26:57.243965 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.244106 kubelet[2109]: E1002 19:26:57.244067 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.244622 kubelet[2109]: E1002 19:26:57.244602 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.244752 kubelet[2109]: W1002 19:26:57.244731 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.244880 kubelet[2109]: E1002 19:26:57.244862 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.245457 kubelet[2109]: E1002 19:26:57.245381 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.245639 kubelet[2109]: W1002 19:26:57.245617 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.245727 kubelet[2109]: E1002 19:26:57.245716 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.246127 kubelet[2109]: E1002 19:26:57.246104 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.246284 kubelet[2109]: W1002 19:26:57.246262 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.246437 kubelet[2109]: E1002 19:26:57.246421 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.247369 kubelet[2109]: E1002 19:26:57.247348 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.247509 kubelet[2109]: W1002 19:26:57.247488 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.247607 kubelet[2109]: E1002 19:26:57.247596 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.248126 kubelet[2109]: E1002 19:26:57.248103 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.248229 kubelet[2109]: W1002 19:26:57.248215 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.248316 kubelet[2109]: E1002 19:26:57.248306 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.248725 kubelet[2109]: E1002 19:26:57.248711 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.248817 kubelet[2109]: W1002 19:26:57.248804 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.248897 kubelet[2109]: E1002 19:26:57.248888 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.249753 kubelet[2109]: E1002 19:26:57.249735 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.249882 kubelet[2109]: W1002 19:26:57.249865 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.250098 kubelet[2109]: E1002 19:26:57.250065 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.250444 kubelet[2109]: E1002 19:26:57.250428 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.250560 kubelet[2109]: W1002 19:26:57.250544 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.250764 kubelet[2109]: E1002 19:26:57.250749 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.251127 kubelet[2109]: E1002 19:26:57.251066 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:57.251273 kubelet[2109]: W1002 19:26:57.251253 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:57.251401 kubelet[2109]: E1002 19:26:57.251385 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:57.279000 audit[2794]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:57.279000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffed57a5770 a2=0 a3=7ffed57a575c items=0 ppid=2306 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:57.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:57.282000 audit[2794]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:26:57.282000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffed57a5770 a2=0 a3=7ffed57a575c items=0 ppid=2306 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:57.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:26:57.604542 systemd[1]: run-containerd-runc-k8s.io-0ed6d4f530f179bd49bdfa2164b18177c0bfc43e6b485109b351ca63ddaa72b1-runc.hI5kzV.mount: Deactivated successfully. Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227342 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.228775 kubelet[2109]: W1002 19:26:58.227373 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227403 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227658 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.228775 kubelet[2109]: W1002 19:26:58.227669 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227686 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227925 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.228775 kubelet[2109]: W1002 19:26:58.227936 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.227952 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.228775 kubelet[2109]: E1002 19:26:58.228280 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.231419 kubelet[2109]: W1002 19:26:58.228292 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.228315 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.228546 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.231419 kubelet[2109]: W1002 19:26:58.228557 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.228577 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.229770 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.231419 kubelet[2109]: W1002 19:26:58.229787 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.229811 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.231419 kubelet[2109]: E1002 19:26:58.230233 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.231419 kubelet[2109]: W1002 19:26:58.230246 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.231956 kubelet[2109]: E1002 19:26:58.230267 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.231956 kubelet[2109]: E1002 19:26:58.230586 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.231956 kubelet[2109]: W1002 19:26:58.230598 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.231956 kubelet[2109]: E1002 19:26:58.230618 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232185 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.233155 kubelet[2109]: W1002 19:26:58.232200 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232220 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232499 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.233155 kubelet[2109]: W1002 19:26:58.232509 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232526 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232773 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.233155 kubelet[2109]: W1002 19:26:58.232783 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.233155 kubelet[2109]: E1002 19:26:58.232798 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.234170 kubelet[2109]: E1002 19:26:58.233652 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.234170 kubelet[2109]: W1002 19:26:58.233665 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.234170 kubelet[2109]: E1002 19:26:58.233685 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.244821 kubelet[2109]: E1002 19:26:58.244594 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.244821 kubelet[2109]: W1002 19:26:58.244620 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.244821 kubelet[2109]: E1002 19:26:58.244646 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.245443 kubelet[2109]: E1002 19:26:58.245425 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.245706 kubelet[2109]: W1002 19:26:58.245548 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.245706 kubelet[2109]: E1002 19:26:58.245583 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.246133 kubelet[2109]: E1002 19:26:58.246116 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.246281 kubelet[2109]: W1002 19:26:58.246263 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.246406 kubelet[2109]: E1002 19:26:58.246393 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.246856 kubelet[2109]: E1002 19:26:58.246837 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.246994 kubelet[2109]: W1002 19:26:58.246975 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.247265 kubelet[2109]: E1002 19:26:58.247250 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.248403 kubelet[2109]: E1002 19:26:58.248384 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.248579 kubelet[2109]: W1002 19:26:58.248559 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.248697 kubelet[2109]: E1002 19:26:58.248683 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.249059 kubelet[2109]: E1002 19:26:58.249045 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.249210 kubelet[2109]: W1002 19:26:58.249191 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.249320 kubelet[2109]: E1002 19:26:58.249307 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.249670 kubelet[2109]: E1002 19:26:58.249656 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.249829 kubelet[2109]: W1002 19:26:58.249809 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.249934 kubelet[2109]: E1002 19:26:58.249920 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.250427 kubelet[2109]: E1002 19:26:58.250410 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.250557 kubelet[2109]: W1002 19:26:58.250541 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.250660 kubelet[2109]: E1002 19:26:58.250647 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.269900 kubelet[2109]: E1002 19:26:58.269865 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.270262 kubelet[2109]: W1002 19:26:58.270236 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.270423 kubelet[2109]: E1002 19:26:58.270394 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273117 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.273967 kubelet[2109]: W1002 19:26:58.273150 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273333 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273554 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.273967 kubelet[2109]: W1002 19:26:58.273565 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273662 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273826 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.273967 kubelet[2109]: W1002 19:26:58.273837 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.273967 kubelet[2109]: E1002 19:26:58.273962 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.274667 kubelet[2109]: E1002 19:26:58.274204 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.274667 kubelet[2109]: W1002 19:26:58.274215 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.274667 kubelet[2109]: E1002 19:26:58.274262 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.274667 kubelet[2109]: E1002 19:26:58.274593 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.274667 kubelet[2109]: W1002 19:26:58.274605 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.274667 kubelet[2109]: E1002 19:26:58.274629 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275133 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.276113 kubelet[2109]: W1002 19:26:58.275149 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275254 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275433 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.276113 kubelet[2109]: W1002 19:26:58.275443 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275459 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275711 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.276113 kubelet[2109]: W1002 19:26:58.275720 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.276113 kubelet[2109]: E1002 19:26:58.275736 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.276557 kubelet[2109]: E1002 19:26:58.276237 2109 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:26:58.276557 kubelet[2109]: W1002 19:26:58.276249 2109 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:26:58.276557 kubelet[2109]: E1002 19:26:58.276268 2109 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:26:58.320019 env[1138]: time="2023-10-02T19:26:58.319946988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:58.323702 env[1138]: time="2023-10-02T19:26:58.323595943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:58.326916 env[1138]: time="2023-10-02T19:26:58.326853472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:58.330170 env[1138]: time="2023-10-02T19:26:58.330111648Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:26:58.331519 env[1138]: time="2023-10-02T19:26:58.331456615Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:26:58.336832 env[1138]: time="2023-10-02T19:26:58.336781843Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:26:58.356695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3465932982.mount: Deactivated successfully. Oct 2 19:26:58.368974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount54232224.mount: Deactivated successfully. Oct 2 19:26:58.371255 env[1138]: time="2023-10-02T19:26:58.371183909Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984\"" Oct 2 19:26:58.372047 env[1138]: time="2023-10-02T19:26:58.372009123Z" level=info msg="StartContainer for \"377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984\"" Oct 2 19:26:58.400309 systemd[1]: Started cri-containerd-377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984.scope. Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2665 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:58.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373632316432396161363561346665356535316664373666666364 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit: BPF prog-id=145 op=LOAD Oct 2 19:26:58.429000 audit[2834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e1be0 items=0 ppid=2665 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:58.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373632316432396161363561346665356535316664373666666364 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit: BPF prog-id=146 op=LOAD Oct 2 19:26:58.429000 audit[2834]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e1c28 items=0 ppid=2665 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:58.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373632316432396161363561346665356535316664373666666364 Oct 2 19:26:58.429000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:26:58.429000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { perfmon } for pid=2834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit[2834]: AVC avc: denied { bpf } for pid=2834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:26:58.429000 audit: BPF prog-id=147 op=LOAD Oct 2 19:26:58.429000 audit[2834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e1cb8 items=0 ppid=2665 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:26:58.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373632316432396161363561346665356535316664373666666364 Oct 2 19:26:58.459957 env[1138]: time="2023-10-02T19:26:58.459891912Z" level=info msg="StartContainer for \"377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984\" returns successfully" Oct 2 19:26:58.475629 systemd[1]: cri-containerd-377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984.scope: Deactivated successfully. Oct 2 19:26:58.478000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:26:59.073746 env[1138]: time="2023-10-02T19:26:59.073679476Z" level=info msg="shim disconnected" id=377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984 Oct 2 19:26:59.074298 env[1138]: time="2023-10-02T19:26:59.074237983Z" level=warning msg="cleaning up after shim disconnected" id=377621d29aa65a4fe5e51fd76ffcde4b7aa5075d2adfb6d29331b931dc7bb984 namespace=k8s.io Oct 2 19:26:59.074298 env[1138]: time="2023-10-02T19:26:59.074276781Z" level=info msg="cleaning up dead shim" Oct 2 19:26:59.086381 env[1138]: time="2023-10-02T19:26:59.086291662Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:26:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2871 runtime=io.containerd.runc.v2\n" Oct 2 19:26:59.170021 env[1138]: time="2023-10-02T19:26:59.168320698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:27:00.027117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount970435612.mount: Deactivated successfully. Oct 2 19:27:03.659218 env[1138]: time="2023-10-02T19:27:03.659139682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:03.662886 env[1138]: time="2023-10-02T19:27:03.662728678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:03.666404 env[1138]: time="2023-10-02T19:27:03.666328758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:03.669986 env[1138]: time="2023-10-02T19:27:03.669917442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:03.670468 env[1138]: time="2023-10-02T19:27:03.670423958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:27:03.675882 env[1138]: time="2023-10-02T19:27:03.675819754Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:27:03.711312 env[1138]: time="2023-10-02T19:27:03.711209726Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de\"" Oct 2 19:27:03.714519 env[1138]: time="2023-10-02T19:27:03.714262878Z" level=info msg="StartContainer for \"f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de\"" Oct 2 19:27:03.750966 systemd[1]: Started cri-containerd-f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de.scope. Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.786980 kernel: kauditd_printk_skb: 217 callbacks suppressed Oct 2 19:27:03.787161 kernel: audit: type=1400 audit(1696274823.780:1182): avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2665 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:03.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637616537383037393630383236613238323862653965633734306334 Oct 2 19:27:03.873807 kernel: audit: type=1300 audit(1696274823.780:1182): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2665 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:03.874000 kernel: audit: type=1327 audit(1696274823.780:1182): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637616537383037393630383236613238323862653965633734306334 Oct 2 19:27:03.874058 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.917423 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.942496 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.942731 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.988727 env[1138]: time="2023-10-02T19:27:03.988660149Z" level=info msg="StartContainer for \"f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de\" returns successfully" Oct 2 19:27:04.008638 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:04.008847 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:04.008899 kernel: audit: type=1400 audit(1696274823.780:1183): avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.780000 audit: BPF prog-id=148 op=LOAD Oct 2 19:27:03.780000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024660 items=0 ppid=2665 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:03.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637616537383037393630383236613238323862653965633734306334 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.807000 audit: BPF prog-id=149 op=LOAD Oct 2 19:27:03.807000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000246a8 items=0 ppid=2665 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:03.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637616537383037393630383236613238323862653965633734306334 Oct 2 19:27:03.841000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:27:03.841000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { perfmon } for pid=2899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit[2899]: AVC avc: denied { bpf } for pid=2899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:03.841000 audit: BPF prog-id=150 op=LOAD Oct 2 19:27:03.841000 audit[2899]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024738 items=0 ppid=2665 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:03.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637616537383037393630383236613238323862653965633734306334 Oct 2 19:27:04.804034 env[1138]: time="2023-10-02T19:27:04.803950175Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:27:04.807672 systemd[1]: cri-containerd-f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de.scope: Deactivated successfully. Oct 2 19:27:04.809000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:27:04.828643 kubelet[2109]: I1002 19:27:04.828595 2109 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:27:04.854089 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de-rootfs.mount: Deactivated successfully. Oct 2 19:27:04.871023 kubelet[2109]: I1002 19:27:04.870370 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:04.878775 kubelet[2109]: W1002 19:27:04.878746 2109 reflector.go:424] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:04.879053 kubelet[2109]: E1002 19:27:04.879033 2109 reflector.go:140] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:04.882034 kubelet[2109]: I1002 19:27:04.881976 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:04.883723 systemd[1]: Created slice kubepods-burstable-pod99894ce5_e998_4615_b06d_f10b432f5a29.slice. Oct 2 19:27:04.885067 kubelet[2109]: I1002 19:27:04.885030 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:04.898599 systemd[1]: Created slice kubepods-besteffort-podadcbea21_b24b_4a1f_82dd_62940b93bfb5.slice. Oct 2 19:27:04.909559 systemd[1]: Created slice kubepods-burstable-podeb8f0de9_95fc_490b_8b49_6717d175e71b.slice. Oct 2 19:27:04.928179 kubelet[2109]: I1002 19:27:04.928128 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/99894ce5-e998-4615-b06d-f10b432f5a29-config-volume\") pod \"coredns-787d4945fb-fdj4r\" (UID: \"99894ce5-e998-4615-b06d-f10b432f5a29\") " pod="kube-system/coredns-787d4945fb-fdj4r" Oct 2 19:27:04.928661 kubelet[2109]: I1002 19:27:04.928627 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/eb8f0de9-95fc-490b-8b49-6717d175e71b-config-volume\") pod \"coredns-787d4945fb-q6jtb\" (UID: \"eb8f0de9-95fc-490b-8b49-6717d175e71b\") " pod="kube-system/coredns-787d4945fb-q6jtb" Oct 2 19:27:04.928915 kubelet[2109]: I1002 19:27:04.928885 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrffw\" (UniqueName: \"kubernetes.io/projected/eb8f0de9-95fc-490b-8b49-6717d175e71b-kube-api-access-zrffw\") pod \"coredns-787d4945fb-q6jtb\" (UID: \"eb8f0de9-95fc-490b-8b49-6717d175e71b\") " pod="kube-system/coredns-787d4945fb-q6jtb" Oct 2 19:27:04.929140 kubelet[2109]: I1002 19:27:04.929121 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whf5z\" (UniqueName: \"kubernetes.io/projected/adcbea21-b24b-4a1f-82dd-62940b93bfb5-kube-api-access-whf5z\") pod \"calico-kube-controllers-69c848ddc6-n9tff\" (UID: \"adcbea21-b24b-4a1f-82dd-62940b93bfb5\") " pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" Oct 2 19:27:04.929366 kubelet[2109]: I1002 19:27:04.929339 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-58nnp\" (UniqueName: \"kubernetes.io/projected/99894ce5-e998-4615-b06d-f10b432f5a29-kube-api-access-58nnp\") pod \"coredns-787d4945fb-fdj4r\" (UID: \"99894ce5-e998-4615-b06d-f10b432f5a29\") " pod="kube-system/coredns-787d4945fb-fdj4r" Oct 2 19:27:04.933703 kubelet[2109]: I1002 19:27:04.933650 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:04.943520 systemd[1]: Created slice kubepods-besteffort-podab7e09b4_bb1a_4cbe_848e_4073bffc883d.slice. Oct 2 19:27:05.030641 kubelet[2109]: I1002 19:27:05.030595 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kcpbm\" (UniqueName: \"kubernetes.io/projected/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-kube-api-access-kcpbm\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.040055 kubelet[2109]: I1002 19:27:05.030862 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-varrun\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.040055 kubelet[2109]: I1002 19:27:05.031015 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-etccalico\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.040055 kubelet[2109]: I1002 19:27:05.031122 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-socket-dir\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.040055 kubelet[2109]: I1002 19:27:05.031326 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-kubelet-dir\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.040055 kubelet[2109]: I1002 19:27:05.031385 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ab7e09b4-bb1a-4cbe-848e-4073bffc883d-registration-dir\") pod \"csi-node-driver-n9mv2\" (UID: \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\") " pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.205501 env[1138]: time="2023-10-02T19:27:05.205321549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-n9tff,Uid:adcbea21-b24b-4a1f-82dd-62940b93bfb5,Namespace:calico-system,Attempt:0,}" Oct 2 19:27:05.548231 env[1138]: time="2023-10-02T19:27:05.548173751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n9mv2,Uid:ab7e09b4-bb1a-4cbe-848e-4073bffc883d,Namespace:calico-system,Attempt:0,}" Oct 2 19:27:05.578282 env[1138]: time="2023-10-02T19:27:05.578215101Z" level=info msg="shim disconnected" id=f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de Oct 2 19:27:05.578589 env[1138]: time="2023-10-02T19:27:05.578553291Z" level=warning msg="cleaning up after shim disconnected" id=f7ae7807960826a2828be9ec740c4d70fbbd124c3540520846720528269326de namespace=k8s.io Oct 2 19:27:05.578746 env[1138]: time="2023-10-02T19:27:05.578714250Z" level=info msg="cleaning up dead shim" Oct 2 19:27:05.594368 env[1138]: time="2023-10-02T19:27:05.594313226Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:27:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2951 runtime=io.containerd.runc.v2\n" Oct 2 19:27:05.718197 env[1138]: time="2023-10-02T19:27:05.718099259Z" level=error msg="Failed to destroy network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.718682 env[1138]: time="2023-10-02T19:27:05.718623294Z" level=error msg="encountered an error cleaning up failed sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.718832 env[1138]: time="2023-10-02T19:27:05.718712531Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-n9tff,Uid:adcbea21-b24b-4a1f-82dd-62940b93bfb5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.719239 kubelet[2109]: E1002 19:27:05.719204 2109 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.719383 kubelet[2109]: E1002 19:27:05.719299 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" Oct 2 19:27:05.719383 kubelet[2109]: E1002 19:27:05.719338 2109 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" Oct 2 19:27:05.719507 kubelet[2109]: E1002 19:27:05.719429 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-n9tff_calico-system(adcbea21-b24b-4a1f-82dd-62940b93bfb5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-n9tff_calico-system(adcbea21-b24b-4a1f-82dd-62940b93bfb5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" podUID=adcbea21-b24b-4a1f-82dd-62940b93bfb5 Oct 2 19:27:05.726661 env[1138]: time="2023-10-02T19:27:05.726593032Z" level=error msg="Failed to destroy network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.727346 env[1138]: time="2023-10-02T19:27:05.727282530Z" level=error msg="encountered an error cleaning up failed sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.727497 env[1138]: time="2023-10-02T19:27:05.727377625Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n9mv2,Uid:ab7e09b4-bb1a-4cbe-848e-4073bffc883d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.727815 kubelet[2109]: E1002 19:27:05.727771 2109 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.727949 kubelet[2109]: E1002 19:27:05.727921 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.728030 kubelet[2109]: E1002 19:27:05.727960 2109 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n9mv2" Oct 2 19:27:05.728139 kubelet[2109]: E1002 19:27:05.728112 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:05.816163 env[1138]: time="2023-10-02T19:27:05.814828279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-q6jtb,Uid:eb8f0de9-95fc-490b-8b49-6717d175e71b,Namespace:kube-system,Attempt:0,}" Oct 2 19:27:05.912293 env[1138]: time="2023-10-02T19:27:05.912207273Z" level=error msg="Failed to destroy network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.917247 env[1138]: time="2023-10-02T19:27:05.916794209Z" level=error msg="encountered an error cleaning up failed sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.917247 env[1138]: time="2023-10-02T19:27:05.917026640Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-q6jtb,Uid:eb8f0de9-95fc-490b-8b49-6717d175e71b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.915663 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2-shm.mount: Deactivated successfully. Oct 2 19:27:05.917887 kubelet[2109]: E1002 19:27:05.917444 2109 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:05.917887 kubelet[2109]: E1002 19:27:05.917517 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-q6jtb" Oct 2 19:27:05.917887 kubelet[2109]: E1002 19:27:05.917553 2109 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-q6jtb" Oct 2 19:27:05.919819 kubelet[2109]: E1002 19:27:05.917641 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-q6jtb_kube-system(eb8f0de9-95fc-490b-8b49-6717d175e71b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-q6jtb_kube-system(eb8f0de9-95fc-490b-8b49-6717d175e71b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-q6jtb" podUID=eb8f0de9-95fc-490b-8b49-6717d175e71b Oct 2 19:27:06.094811 env[1138]: time="2023-10-02T19:27:06.093783181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fdj4r,Uid:99894ce5-e998-4615-b06d-f10b432f5a29,Namespace:kube-system,Attempt:0,}" Oct 2 19:27:06.187308 kubelet[2109]: I1002 19:27:06.187271 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:06.190643 env[1138]: time="2023-10-02T19:27:06.188303201Z" level=info msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" Oct 2 19:27:06.191045 kubelet[2109]: I1002 19:27:06.189986 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:06.192177 env[1138]: time="2023-10-02T19:27:06.190663219Z" level=info msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" Oct 2 19:27:06.200130 env[1138]: time="2023-10-02T19:27:06.198939142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:27:06.204124 kubelet[2109]: I1002 19:27:06.203517 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:06.204982 env[1138]: time="2023-10-02T19:27:06.204899961Z" level=info msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" Oct 2 19:27:06.303593 env[1138]: time="2023-10-02T19:27:06.303511947Z" level=error msg="Failed to destroy network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.306639 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8-shm.mount: Deactivated successfully. Oct 2 19:27:06.308345 env[1138]: time="2023-10-02T19:27:06.308264438Z" level=error msg="encountered an error cleaning up failed sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.308520 env[1138]: time="2023-10-02T19:27:06.308375318Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fdj4r,Uid:99894ce5-e998-4615-b06d-f10b432f5a29,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.312651 kubelet[2109]: E1002 19:27:06.308904 2109 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.312651 kubelet[2109]: E1002 19:27:06.309019 2109 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-fdj4r" Oct 2 19:27:06.312651 kubelet[2109]: E1002 19:27:06.309056 2109 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-fdj4r" Oct 2 19:27:06.314172 kubelet[2109]: E1002 19:27:06.309231 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-fdj4r_kube-system(99894ce5-e998-4615-b06d-f10b432f5a29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-fdj4r_kube-system(99894ce5-e998-4615-b06d-f10b432f5a29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-fdj4r" podUID=99894ce5-e998-4615-b06d-f10b432f5a29 Oct 2 19:27:06.343881 env[1138]: time="2023-10-02T19:27:06.343800452Z" level=error msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" failed" error="failed to destroy network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.344947 kubelet[2109]: E1002 19:27:06.344819 2109 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:06.345910 kubelet[2109]: E1002 19:27:06.345878 2109 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2} Oct 2 19:27:06.346053 kubelet[2109]: E1002 19:27:06.345974 2109 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eb8f0de9-95fc-490b-8b49-6717d175e71b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:27:06.346053 kubelet[2109]: E1002 19:27:06.346049 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eb8f0de9-95fc-490b-8b49-6717d175e71b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-q6jtb" podUID=eb8f0de9-95fc-490b-8b49-6717d175e71b Oct 2 19:27:06.351576 env[1138]: time="2023-10-02T19:27:06.351497333Z" level=error msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" failed" error="failed to destroy network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.352328 kubelet[2109]: E1002 19:27:06.352067 2109 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:06.352328 kubelet[2109]: E1002 19:27:06.352154 2109 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44} Oct 2 19:27:06.352328 kubelet[2109]: E1002 19:27:06.352227 2109 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adcbea21-b24b-4a1f-82dd-62940b93bfb5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:27:06.352328 kubelet[2109]: E1002 19:27:06.352290 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adcbea21-b24b-4a1f-82dd-62940b93bfb5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" podUID=adcbea21-b24b-4a1f-82dd-62940b93bfb5 Oct 2 19:27:06.367027 env[1138]: time="2023-10-02T19:27:06.366921545Z" level=error msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" failed" error="failed to destroy network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:06.367493 kubelet[2109]: E1002 19:27:06.367444 2109 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:06.367682 kubelet[2109]: E1002 19:27:06.367518 2109 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58} Oct 2 19:27:06.367682 kubelet[2109]: E1002 19:27:06.367603 2109 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:27:06.367682 kubelet[2109]: E1002 19:27:06.367671 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ab7e09b4-bb1a-4cbe-848e-4073bffc883d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:07.208113 kubelet[2109]: I1002 19:27:07.207729 2109 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:07.209244 env[1138]: time="2023-10-02T19:27:07.209198791Z" level=info msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" Oct 2 19:27:07.297114 env[1138]: time="2023-10-02T19:27:07.297023841Z" level=error msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" failed" error="failed to destroy network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:27:07.298035 kubelet[2109]: E1002 19:27:07.297742 2109 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:07.298035 kubelet[2109]: E1002 19:27:07.297811 2109 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8} Oct 2 19:27:07.298035 kubelet[2109]: E1002 19:27:07.297922 2109 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"99894ce5-e998-4615-b06d-f10b432f5a29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:27:07.298035 kubelet[2109]: E1002 19:27:07.297992 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"99894ce5-e998-4615-b06d-f10b432f5a29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-fdj4r" podUID=99894ce5-e998-4615-b06d-f10b432f5a29 Oct 2 19:27:11.197899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1118592230.mount: Deactivated successfully. Oct 2 19:27:11.259098 env[1138]: time="2023-10-02T19:27:11.259007661Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:11.262376 env[1138]: time="2023-10-02T19:27:11.262322863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:11.264924 env[1138]: time="2023-10-02T19:27:11.264861870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:11.267327 env[1138]: time="2023-10-02T19:27:11.267268294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:11.267914 env[1138]: time="2023-10-02T19:27:11.267874396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:27:11.272723 env[1138]: time="2023-10-02T19:27:11.272669536Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:27:11.296578 env[1138]: time="2023-10-02T19:27:11.296505231Z" level=info msg="CreateContainer within sandbox \"81e79d202b592519cdad798c0daf3ffd676e552a77ce1ea1505516a89a28339d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb\"" Oct 2 19:27:11.299726 env[1138]: time="2023-10-02T19:27:11.297184292Z" level=info msg="StartContainer for \"a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb\"" Oct 2 19:27:11.338331 systemd[1]: Started cri-containerd-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb.scope. Oct 2 19:27:11.391351 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:27:11.391554 kernel: audit: type=1400 audit(1696274831.363:1189): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423606 kernel: audit: type=1300 audit(1696274831.363:1189): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2665 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:11.363000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2665 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:11.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363030343235633665323065396130396132653935616230326431 Oct 2 19:27:11.477206 kernel: audit: type=1327 audit(1696274831.363:1189): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363030343235633665323065396130396132653935616230326431 Oct 2 19:27:11.477351 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.477402 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.519273 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.519440 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.529224 env[1138]: time="2023-10-02T19:27:11.529159299Z" level=info msg="StartContainer for \"a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb\" returns successfully" Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.581385 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.581574 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.581622 kernel: audit: type=1400 audit(1696274831.363:1190): avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.363000 audit: BPF prog-id=151 op=LOAD Oct 2 19:27:11.363000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003c8450 items=0 ppid=2665 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:11.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363030343235633665323065396130396132653935616230326431 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.390000 audit: BPF prog-id=152 op=LOAD Oct 2 19:27:11.390000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003c8498 items=0 ppid=2665 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:11.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363030343235633665323065396130396132653935616230326431 Oct 2 19:27:11.422000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:27:11.423000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:11.423000 audit: BPF prog-id=153 op=LOAD Oct 2 19:27:11.423000 audit[3182]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c8528 items=0 ppid=2665 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:11.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363030343235633665323065396130396132653935616230326431 Oct 2 19:27:11.680274 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:27:11.680426 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:27:12.250517 kubelet[2109]: I1002 19:27:12.250471 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-f9x2h" podStartSLOduration=-9.22337201760437e+09 pod.CreationTimestamp="2023-10-02 19:26:53 +0000 UTC" firstStartedPulling="2023-10-02 19:26:55.594952428 +0000 UTC m=+19.979802167" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:27:12.248257301 +0000 UTC m=+36.633107049" watchObservedRunningTime="2023-10-02 19:27:12.250405163 +0000 UTC m=+36.635254914" Oct 2 19:27:12.269514 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.ePPP4r.mount: Deactivated successfully. Oct 2 19:27:13.260234 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.64y1Wo.mount: Deactivated successfully. Oct 2 19:27:13.345000 audit[3326]: AVC avc: denied { write } for pid=3326 comm="tee" name="fd" dev="proc" ino=24710 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.345000 audit[3326]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffeffa891e a2=241 a3=1b6 items=1 ppid=3266 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.345000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:27:13.345000 audit: PATH item=0 name="/dev/fd/63" inode=24561 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.347000 audit[3330]: AVC avc: denied { write } for pid=3330 comm="tee" name="fd" dev="proc" ino=24712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.347000 audit[3330]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb9aaa92f a2=241 a3=1b6 items=1 ppid=3282 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.347000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:27:13.347000 audit: PATH item=0 name="/dev/fd/63" inode=24566 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.347000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.349000 audit[3328]: AVC avc: denied { write } for pid=3328 comm="tee" name="fd" dev="proc" ino=25615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.349000 audit[3328]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc02ee992d a2=241 a3=1b6 items=1 ppid=3272 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.349000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:27:13.349000 audit: PATH item=0 name="/dev/fd/63" inode=24701 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.361000 audit[3332]: AVC avc: denied { write } for pid=3332 comm="tee" name="fd" dev="proc" ino=25622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.364000 audit[3346]: AVC avc: denied { write } for pid=3346 comm="tee" name="fd" dev="proc" ino=25626 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.364000 audit[3346]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda19d992d a2=241 a3=1b6 items=1 ppid=3274 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.364000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:27:13.364000 audit: PATH item=0 name="/dev/fd/63" inode=24714 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.368000 audit[3343]: AVC avc: denied { write } for pid=3343 comm="tee" name="fd" dev="proc" ino=25630 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.368000 audit[3343]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe42d8792d a2=241 a3=1b6 items=1 ppid=3268 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.368000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:27:13.368000 audit: PATH item=0 name="/dev/fd/63" inode=24570 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.368000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.370000 audit[3334]: AVC avc: denied { write } for pid=3334 comm="tee" name="fd" dev="proc" ino=24717 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:27:13.361000 audit[3332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc768a692e a2=241 a3=1b6 items=1 ppid=3283 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.361000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:27:13.361000 audit: PATH item=0 name="/dev/fd/63" inode=24567 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.361000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:13.370000 audit[3334]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb90c891d a2=241 a3=1b6 items=1 ppid=3288 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:13.370000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:27:13.370000 audit: PATH item=0 name="/dev/fd/63" inode=24568 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:27:13.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.033000 audit: BPF prog-id=154 op=LOAD Oct 2 19:27:14.033000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc37056440 a2=70 a3=7fd52d113000 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.034000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.034000 audit: BPF prog-id=155 op=LOAD Oct 2 19:27:14.034000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc37056440 a2=70 a3=6e items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.036000 audit: BPF prog-id=155 op=UNLOAD Oct 2 19:27:14.036000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.036000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc370563f0 a2=70 a3=7ffc37056440 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.036000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.038000 audit: BPF prog-id=156 op=LOAD Oct 2 19:27:14.038000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc370563d0 a2=70 a3=7ffc37056440 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.038000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.039000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:27:14.039000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.039000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc370564b0 a2=70 a3=0 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.039000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.039000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.039000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc370564a0 a2=70 a3=0 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.039000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc370564e0 a2=70 a3=0 items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.040000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { perfmon } for pid=3428 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit[3428]: AVC avc: denied { bpf } for pid=3428 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.040000 audit: BPF prog-id=157 op=LOAD Oct 2 19:27:14.040000 audit[3428]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc37056400 a2=70 a3=ffffffff items=0 ppid=3269 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.040000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:27:14.047000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.047000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38712e30 a2=70 a3=fff80800 items=0 ppid=3269 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.047000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:27:14.048000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:14.048000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff38712d00 a2=70 a3=3 items=0 ppid=3269 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.048000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:27:14.054000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:27:14.054000 audit[3432]: SYSCALL arch=c000003e syscall=46 success=yes exit=32 a0=3 a1=7fffe1f2aaf0 a2=0 a3=0 items=0 ppid=3269 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.054000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Oct 2 19:27:14.174000 audit[3456]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=3456 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:14.174000 audit[3456]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd8e8dd780 a2=0 a3=7ffd8e8dd76c items=0 ppid=3269 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:14.176000 audit[3454]: NETFILTER_CFG table=raw:114 family=2 entries=19 op=nft_register_chain pid=3454 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:14.176000 audit[3454]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffeea310980 a2=0 a3=558861920000 items=0 ppid=3269 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.176000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:14.184000 audit[3455]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_chain pid=3455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:14.184000 audit[3455]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffecbe7d910 a2=0 a3=55be2dcac000 items=0 ppid=3269 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.184000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:14.192000 audit[3458]: NETFILTER_CFG table=filter:116 family=2 entries=39 op=nft_register_chain pid=3458 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:14.192000 audit[3458]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe161c1cb0 a2=0 a3=7ffe161c1c9c items=0 ppid=3269 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:14.192000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:14.898438 systemd-networkd[1022]: vxlan.calico: Link UP Oct 2 19:27:14.898455 systemd-networkd[1022]: vxlan.calico: Gained carrier Oct 2 19:27:16.606374 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL Oct 2 19:27:17.034850 env[1138]: time="2023-10-02T19:27:17.034791542Z" level=info msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.099 [INFO][3523] k8s.go 576: Cleaning up netns ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.100 [INFO][3523] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" iface="eth0" netns="/var/run/netns/cni-41d785f2-a50e-348d-61bc-73e671f4b7de" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.100 [INFO][3523] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" iface="eth0" netns="/var/run/netns/cni-41d785f2-a50e-348d-61bc-73e671f4b7de" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.100 [INFO][3523] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" iface="eth0" netns="/var/run/netns/cni-41d785f2-a50e-348d-61bc-73e671f4b7de" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.101 [INFO][3523] k8s.go 583: Releasing IP address(es) ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.101 [INFO][3523] utils.go 196: Calico CNI releasing IP address ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.128 [INFO][3529] ipam_plugin.go 416: Releasing address using handleID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.143612 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:17.143612 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.138 [WARNING][3529] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.138 [INFO][3529] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.143612 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:17.143612 env[1138]: 2023-10-02 19:27:17.142 [INFO][3523] k8s.go 589: Teardown processing complete. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:17.145265 env[1138]: time="2023-10-02T19:27:17.145206547Z" level=info msg="TearDown network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" successfully" Oct 2 19:27:17.145466 env[1138]: time="2023-10-02T19:27:17.145435303Z" level=info msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" returns successfully" Oct 2 19:27:17.147340 systemd[1]: run-netns-cni\x2d41d785f2\x2da50e\x2d348d\x2d61bc\x2d73e671f4b7de.mount: Deactivated successfully. Oct 2 19:27:17.150021 env[1138]: time="2023-10-02T19:27:17.149972659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-n9tff,Uid:adcbea21-b24b-4a1f-82dd-62940b93bfb5,Namespace:calico-system,Attempt:1,}" Oct 2 19:27:17.343342 systemd-networkd[1022]: calia7787e19a5e: Link UP Oct 2 19:27:17.353115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7787e19a5e: link becomes ready Oct 2 19:27:17.353914 systemd-networkd[1022]: calia7787e19a5e: Gained carrier Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.225 [INFO][3535] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0 calico-kube-controllers-69c848ddc6- calico-system adcbea21-b24b-4a1f-82dd-62940b93bfb5 666 0 2023-10-02 19:26:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal calico-kube-controllers-69c848ddc6-n9tff eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia7787e19a5e [] []}} ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.225 [INFO][3535] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.282 [INFO][3547] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" HandleID="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.297 [INFO][3547] ipam_plugin.go 269: Auto assigning IP ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" HandleID="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000525140), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"calico-kube-controllers-69c848ddc6-n9tff", "timestamp":"2023-10-02 19:27:17.282265294 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:17.378220 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:17.378220 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.297 [INFO][3547] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.301 [INFO][3547] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.306 [INFO][3547] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.311 [INFO][3547] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.313 [INFO][3547] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.316 [INFO][3547] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.316 [INFO][3547] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.318 [INFO][3547] ipam.go 1682: Creating new handle: k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697 Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.322 [INFO][3547] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.328 [INFO][3547] ipam.go 1216: Successfully claimed IPs: [192.168.52.193/26] block=192.168.52.192/26 handle="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.329 [INFO][3547] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.193/26] handle="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:17.378220 env[1138]: time="2023-10-02T19:27:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:17.378220 env[1138]: 2023-10-02 19:27:17.329 [INFO][3547] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.193/26] IPv6=[] ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" HandleID="k8s-pod-network.fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.332 [INFO][3535] k8s.go 383: Populated endpoint ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"adcbea21-b24b-4a1f-82dd-62940b93bfb5", ResourceVersion:"666", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-n9tff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7787e19a5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.333 [INFO][3535] k8s.go 384: Calico CNI using IPs: [192.168.52.193/32] ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.333 [INFO][3535] dataplane_linux.go 68: Setting the host side veth name to calia7787e19a5e ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.334 [INFO][3535] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.344 [INFO][3535] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"adcbea21-b24b-4a1f-82dd-62940b93bfb5", ResourceVersion:"666", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697", Pod:"calico-kube-controllers-69c848ddc6-n9tff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7787e19a5e", MAC:"6e:c3:e3:e8:04:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:17.379544 env[1138]: 2023-10-02 19:27:17.374 [INFO][3535] k8s.go 489: Wrote updated endpoint to datastore ContainerID="fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-n9tff" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:17.402655 env[1138]: time="2023-10-02T19:27:17.402564361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:17.402960 env[1138]: time="2023-10-02T19:27:17.402917806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:17.403183 env[1138]: time="2023-10-02T19:27:17.403143059Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:17.403548 env[1138]: time="2023-10-02T19:27:17.403506323Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697 pid=3570 runtime=io.containerd.runc.v2 Oct 2 19:27:17.426747 systemd[1]: Started cri-containerd-fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697.scope. Oct 2 19:27:17.482131 kernel: kauditd_printk_skb: 153 callbacks suppressed Oct 2 19:27:17.482324 kernel: audit: type=1400 audit(1696274837.472:1220): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.525101 kernel: audit: type=1400 audit(1696274837.472:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.569055 kernel: audit: type=1400 audit(1696274837.472:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.569227 kernel: audit: type=1400 audit(1696274837.472:1223): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.591062 kernel: audit: type=1400 audit(1696274837.472:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.591266 kernel: audit: type=1400 audit(1696274837.472:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.636124 kernel: audit: type=1400 audit(1696274837.472:1226): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.659266 kernel: audit: type=1400 audit(1696274837.472:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.681170 kernel: audit: type=1400 audit(1696274837.472:1228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.719124 kernel: audit: type=1400 audit(1696274837.472:1229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.472000 audit: BPF prog-id=158 op=LOAD Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3570 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613935643337316131633339336166343930323634343763623539 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3570 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613935643337316131633339336166343930323634343763623539 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.500000 audit: BPF prog-id=159 op=LOAD Oct 2 19:27:17.500000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292620 items=0 ppid=3570 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613935643337316131633339336166343930323634343763623539 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit: BPF prog-id=160 op=LOAD Oct 2 19:27:17.501000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292668 items=0 ppid=3570 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613935643337316131633339336166343930323634343763623539 Oct 2 19:27:17.501000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:27:17.501000 audit: BPF prog-id=159 op=UNLOAD Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:17.501000 audit: BPF prog-id=161 op=LOAD Oct 2 19:27:17.501000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000292a78 items=0 ppid=3570 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663613935643337316131633339336166343930323634343763623539 Oct 2 19:27:17.562000 audit[3598]: NETFILTER_CFG table=filter:117 family=2 entries=36 op=nft_register_chain pid=3598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:17.562000 audit[3598]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc307ed450 a2=0 a3=7ffc307ed43c items=0 ppid=3269 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:17.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:17.738381 env[1138]: time="2023-10-02T19:27:17.738072213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-n9tff,Uid:adcbea21-b24b-4a1f-82dd-62940b93bfb5,Namespace:calico-system,Attempt:1,} returns sandbox id \"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697\"" Oct 2 19:27:17.742866 env[1138]: time="2023-10-02T19:27:17.742808917Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:27:18.399766 systemd-networkd[1022]: calia7787e19a5e: Gained IPv6LL Oct 2 19:27:18.584953 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1898754418.mount: Deactivated successfully. Oct 2 19:27:20.038037 env[1138]: time="2023-10-02T19:27:20.037984719Z" level=info msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" Oct 2 19:27:20.039601 env[1138]: time="2023-10-02T19:27:20.039531517Z" level=info msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" Oct 2 19:27:20.042759 env[1138]: time="2023-10-02T19:27:20.042688120Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:20.052768 env[1138]: time="2023-10-02T19:27:20.051872828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:20.059318 env[1138]: time="2023-10-02T19:27:20.059264997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:20.066103 env[1138]: time="2023-10-02T19:27:20.065505674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:27:20.066300 env[1138]: time="2023-10-02T19:27:20.066152460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:27:20.073332 env[1138]: time="2023-10-02T19:27:20.073276858Z" level=info msg="CreateContainer within sandbox \"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:27:20.107895 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2774876102.mount: Deactivated successfully. Oct 2 19:27:20.117831 env[1138]: time="2023-10-02T19:27:20.115438152Z" level=info msg="CreateContainer within sandbox \"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d\"" Oct 2 19:27:20.122001 env[1138]: time="2023-10-02T19:27:20.121932873Z" level=info msg="StartContainer for \"45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d\"" Oct 2 19:27:20.239230 systemd[1]: Started cri-containerd-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d.scope. Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.263000 audit: BPF prog-id=162 op=LOAD Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3570 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646231316163653430343134386632363132343630393662366532 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3570 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646231316163653430343134386632363132343630393662366532 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit: BPF prog-id=163 op=LOAD Oct 2 19:27:20.264000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00038f1d0 items=0 ppid=3570 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646231316163653430343134386632363132343630393662366532 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit: BPF prog-id=164 op=LOAD Oct 2 19:27:20.264000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00038f218 items=0 ppid=3570 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646231316163653430343134386632363132343630393662366532 Oct 2 19:27:20.264000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:27:20.264000 audit: BPF prog-id=163 op=UNLOAD Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.264000 audit: BPF prog-id=165 op=LOAD Oct 2 19:27:20.264000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00038f628 items=0 ppid=3570 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435646231316163653430343134386632363132343630393662366532 Oct 2 19:27:20.300785 env[1138]: time="2023-10-02T19:27:20.300648930Z" level=info msg="StartContainer for \"45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d\" returns successfully" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.196 [INFO][3647] k8s.go 576: Cleaning up netns ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.196 [INFO][3647] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" iface="eth0" netns="/var/run/netns/cni-0bdb2747-0a02-0f06-0082-b38ec593152d" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.198 [INFO][3647] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" iface="eth0" netns="/var/run/netns/cni-0bdb2747-0a02-0f06-0082-b38ec593152d" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.200 [INFO][3647] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" iface="eth0" netns="/var/run/netns/cni-0bdb2747-0a02-0f06-0082-b38ec593152d" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.200 [INFO][3647] k8s.go 583: Releasing IP address(es) ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.200 [INFO][3647] utils.go 196: Calico CNI releasing IP address ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.331 [INFO][3679] ipam_plugin.go 416: Releasing address using handleID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.353155 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:20.353155 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.347 [WARNING][3679] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.347 [INFO][3679] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.353155 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:20.353155 env[1138]: 2023-10-02 19:27:20.351 [INFO][3647] k8s.go 589: Teardown processing complete. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:20.354024 env[1138]: time="2023-10-02T19:27:20.353360179Z" level=info msg="TearDown network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" successfully" Oct 2 19:27:20.354024 env[1138]: time="2023-10-02T19:27:20.353416166Z" level=info msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" returns successfully" Oct 2 19:27:20.355114 env[1138]: time="2023-10-02T19:27:20.355048878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n9mv2,Uid:ab7e09b4-bb1a-4cbe-848e-4073bffc883d,Namespace:calico-system,Attempt:1,}" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.234 [INFO][3655] k8s.go 576: Cleaning up netns ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.235 [INFO][3655] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" iface="eth0" netns="/var/run/netns/cni-644a616f-6313-8269-1d14-6616847c6432" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.235 [INFO][3655] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" iface="eth0" netns="/var/run/netns/cni-644a616f-6313-8269-1d14-6616847c6432" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.236 [INFO][3655] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" iface="eth0" netns="/var/run/netns/cni-644a616f-6313-8269-1d14-6616847c6432" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.236 [INFO][3655] k8s.go 583: Releasing IP address(es) ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.236 [INFO][3655] utils.go 196: Calico CNI releasing IP address ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.361 [INFO][3682] ipam_plugin.go 416: Releasing address using handleID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.377012 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:20.377012 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.371 [WARNING][3682] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.371 [INFO][3682] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.377012 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:20.377012 env[1138]: 2023-10-02 19:27:20.375 [INFO][3655] k8s.go 589: Teardown processing complete. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:20.378160 env[1138]: time="2023-10-02T19:27:20.378063950Z" level=info msg="TearDown network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" successfully" Oct 2 19:27:20.378361 env[1138]: time="2023-10-02T19:27:20.378319304Z" level=info msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" returns successfully" Oct 2 19:27:20.379522 env[1138]: time="2023-10-02T19:27:20.379471210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-q6jtb,Uid:eb8f0de9-95fc-490b-8b49-6717d175e71b,Namespace:kube-system,Attempt:1,}" Oct 2 19:27:20.655574 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:27:20.655785 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali774dec90b00: link becomes ready Oct 2 19:27:20.663286 systemd-networkd[1022]: cali774dec90b00: Link UP Oct 2 19:27:20.663301 systemd-networkd[1022]: cali774dec90b00: Gained carrier Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.461 [INFO][3713] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0 csi-node-driver- calico-system ab7e09b4-bb1a-4cbe-848e-4073bffc883d 681 0 2023-10-02 19:27:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal csi-node-driver-n9mv2 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali774dec90b00 [] []}} ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.462 [INFO][3713] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.568 [INFO][3735] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" HandleID="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.585 [INFO][3735] ipam_plugin.go 269: Auto assigning IP ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" HandleID="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"csi-node-driver-n9mv2", "timestamp":"2023-10-02 19:27:20.5689562 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:20.689487 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:20.689487 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.586 [INFO][3735] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.589 [INFO][3735] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.604 [INFO][3735] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.614 [INFO][3735] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.617 [INFO][3735] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.620 [INFO][3735] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.620 [INFO][3735] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.622 [INFO][3735] ipam.go 1682: Creating new handle: k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085 Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.628 [INFO][3735] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.636 [INFO][3735] ipam.go 1216: Successfully claimed IPs: [192.168.52.194/26] block=192.168.52.192/26 handle="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.636 [INFO][3735] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.194/26] handle="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.689487 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:20.689487 env[1138]: 2023-10-02 19:27:20.636 [INFO][3735] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.194/26] IPv6=[] ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" HandleID="k8s-pod-network.d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.638 [INFO][3713] k8s.go 383: Populated endpoint ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ab7e09b4-bb1a-4cbe-848e-4073bffc883d", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-n9mv2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali774dec90b00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.639 [INFO][3713] k8s.go 384: Calico CNI using IPs: [192.168.52.194/32] ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.639 [INFO][3713] dataplane_linux.go 68: Setting the host side veth name to cali774dec90b00 ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.656 [INFO][3713] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.663 [INFO][3713] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ab7e09b4-bb1a-4cbe-848e-4073bffc883d", ResourceVersion:"681", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085", Pod:"csi-node-driver-n9mv2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali774dec90b00", MAC:"1a:82:6b:12:a8:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:20.691737 env[1138]: 2023-10-02 19:27:20.685 [INFO][3713] k8s.go 489: Wrote updated endpoint to datastore ContainerID="d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085" Namespace="calico-system" Pod="csi-node-driver-n9mv2" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:20.742160 env[1138]: time="2023-10-02T19:27:20.741411673Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:20.742160 env[1138]: time="2023-10-02T19:27:20.741468291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:20.742160 env[1138]: time="2023-10-02T19:27:20.741486240Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:20.742160 env[1138]: time="2023-10-02T19:27:20.741654737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085 pid=3772 runtime=io.containerd.runc.v2 Oct 2 19:27:20.776354 systemd[1]: Started cri-containerd-d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085.scope. Oct 2 19:27:20.811218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia91b04a2fb2: link becomes ready Oct 2 19:27:20.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.809000 audit: BPF prog-id=166 op=LOAD Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3772 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336134303564323130313535653765653630376630306364383831 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3772 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336134303564323130313535653765653630376630306364383831 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.810000 audit: BPF prog-id=167 op=LOAD Oct 2 19:27:20.810000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003446f0 items=0 ppid=3772 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336134303564323130313535653765653630376630306364383831 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit: BPF prog-id=168 op=LOAD Oct 2 19:27:20.811000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000344738 items=0 ppid=3772 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336134303564323130313535653765653630376630306364383831 Oct 2 19:27:20.811000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:27:20.811000 audit: BPF prog-id=167 op=UNLOAD Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { perfmon } for pid=3783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit[3783]: AVC avc: denied { bpf } for pid=3783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.811000 audit: BPF prog-id=169 op=LOAD Oct 2 19:27:20.811000 audit[3783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000344b48 items=0 ppid=3772 pid=3783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336134303564323130313535653765653630376630306364383831 Oct 2 19:27:20.828376 systemd-networkd[1022]: calia91b04a2fb2: Link UP Oct 2 19:27:20.828383 systemd-networkd[1022]: calia91b04a2fb2: Gained carrier Oct 2 19:27:20.862253 env[1138]: time="2023-10-02T19:27:20.858627367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n9mv2,Uid:ab7e09b4-bb1a-4cbe-848e-4073bffc883d,Namespace:calico-system,Attempt:1,} returns sandbox id \"d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085\"" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.527 [INFO][3722] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0 coredns-787d4945fb- kube-system eb8f0de9-95fc-490b-8b49-6717d175e71b 682 0 2023-10-02 19:26:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal coredns-787d4945fb-q6jtb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia91b04a2fb2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.527 [INFO][3722] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.628 [INFO][3743] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" HandleID="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.678 [INFO][3743] ipam_plugin.go 269: Auto assigning IP ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" HandleID="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012f090), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-q6jtb", "timestamp":"2023-10-02 19:27:20.628353918 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:20.862901 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:20.862901 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.678 [INFO][3743] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.707 [INFO][3743] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.722 [INFO][3743] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.729 [INFO][3743] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.733 [INFO][3743] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.738 [INFO][3743] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.739 [INFO][3743] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.746 [INFO][3743] ipam.go 1682: Creating new handle: k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7 Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.756 [INFO][3743] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.772 [INFO][3743] ipam.go 1216: Successfully claimed IPs: [192.168.52.195/26] block=192.168.52.192/26 handle="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.772 [INFO][3743] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.195/26] handle="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:20.862901 env[1138]: time="2023-10-02T19:27:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:20.862901 env[1138]: 2023-10-02 19:27:20.772 [INFO][3743] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.195/26] IPv6=[] ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" HandleID="k8s-pod-network.c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.775 [INFO][3722] k8s.go 383: Populated endpoint ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"eb8f0de9-95fc-490b-8b49-6717d175e71b", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-q6jtb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia91b04a2fb2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.775 [INFO][3722] k8s.go 384: Calico CNI using IPs: [192.168.52.195/32] ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.776 [INFO][3722] dataplane_linux.go 68: Setting the host side veth name to calia91b04a2fb2 ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.816 [INFO][3722] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.831 [INFO][3722] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"eb8f0de9-95fc-490b-8b49-6717d175e71b", ResourceVersion:"682", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7", Pod:"coredns-787d4945fb-q6jtb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia91b04a2fb2", MAC:"3a:6d:d5:26:82:0e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:20.864216 env[1138]: 2023-10-02 19:27:20.856 [INFO][3722] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7" Namespace="kube-system" Pod="coredns-787d4945fb-q6jtb" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:20.876203 env[1138]: time="2023-10-02T19:27:20.876150108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:27:20.902789 env[1138]: time="2023-10-02T19:27:20.902681972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:20.903046 env[1138]: time="2023-10-02T19:27:20.902808193Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:20.903046 env[1138]: time="2023-10-02T19:27:20.902862691Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:20.903288 env[1138]: time="2023-10-02T19:27:20.903203874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7 pid=3831 runtime=io.containerd.runc.v2 Oct 2 19:27:20.904000 audit[3824]: NETFILTER_CFG table=filter:118 family=2 entries=34 op=nft_register_chain pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:20.904000 audit[3824]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffd056e6df0 a2=0 a3=7ffd056e6ddc items=0 ppid=3269 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:20.938656 systemd[1]: Started cri-containerd-c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7.scope. Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.972000 audit: BPF prog-id=170 op=LOAD Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3831 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663266373436616434343330623131653437653539653164303863 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3831 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663266373436616434343330623131653437653539653164303863 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.973000 audit: BPF prog-id=171 op=LOAD Oct 2 19:27:20.973000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000300350 items=0 ppid=3831 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663266373436616434343330623131653437653539653164303863 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit: BPF prog-id=172 op=LOAD Oct 2 19:27:20.974000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000300398 items=0 ppid=3831 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663266373436616434343330623131653437653539653164303863 Oct 2 19:27:20.974000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:27:20.974000 audit: BPF prog-id=171 op=UNLOAD Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { perfmon } for pid=3841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit[3841]: AVC avc: denied { bpf } for pid=3841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:20.974000 audit: BPF prog-id=173 op=LOAD Oct 2 19:27:20.974000 audit[3841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c0003007a8 items=0 ppid=3831 pid=3841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:20.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334663266373436616434343330623131653437653539653164303863 Oct 2 19:27:21.014538 env[1138]: time="2023-10-02T19:27:21.014431650Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:21.018193 env[1138]: time="2023-10-02T19:27:21.018113189Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:21.018529 kubelet[2109]: E1002 19:27:21.018484 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:21.019183 kubelet[2109]: E1002 19:27:21.018551 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:21.019278 kubelet[2109]: E1002 19:27:21.019117 2109 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:21.020665 env[1138]: time="2023-10-02T19:27:21.020613705Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:27:21.035876 env[1138]: time="2023-10-02T19:27:21.035435992Z" level=info msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" Oct 2 19:27:21.055069 env[1138]: time="2023-10-02T19:27:21.055009437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-q6jtb,Uid:eb8f0de9-95fc-490b-8b49-6717d175e71b,Namespace:kube-system,Attempt:1,} returns sandbox id \"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7\"" Oct 2 19:27:21.062599 env[1138]: time="2023-10-02T19:27:21.062540853Z" level=info msg="CreateContainer within sandbox \"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:27:21.109111 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.K3WIlh.mount: Deactivated successfully. Oct 2 19:27:21.109283 systemd[1]: run-netns-cni\x2d644a616f\x2d6313\x2d8269\x2d1d14\x2d6616847c6432.mount: Deactivated successfully. Oct 2 19:27:21.109377 systemd[1]: run-netns-cni\x2d0bdb2747\x2d0a02\x2d0f06\x2d0082\x2db38ec593152d.mount: Deactivated successfully. Oct 2 19:27:21.119278 env[1138]: time="2023-10-02T19:27:21.119209024Z" level=info msg="CreateContainer within sandbox \"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ce57f034a3486b51d2e2dc3c5b8acbb884c18b5f7335cf8a01b1ffab89847733\"" Oct 2 19:27:21.120510 env[1138]: time="2023-10-02T19:27:21.120472428Z" level=info msg="StartContainer for \"ce57f034a3486b51d2e2dc3c5b8acbb884c18b5f7335cf8a01b1ffab89847733\"" Oct 2 19:27:21.155322 env[1138]: time="2023-10-02T19:27:21.155229916Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:21.157629 env[1138]: time="2023-10-02T19:27:21.157540649Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:21.157931 kubelet[2109]: E1002 19:27:21.157885 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:21.158068 kubelet[2109]: E1002 19:27:21.157947 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:21.158203 kubelet[2109]: E1002 19:27:21.158116 2109 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:21.158382 kubelet[2109]: E1002 19:27:21.158206 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:21.160000 audit[3889]: NETFILTER_CFG table=filter:119 family=2 entries=50 op=nft_register_chain pid=3889 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:21.160000 audit[3889]: SYSCALL arch=c000003e syscall=46 success=yes exit=25136 a0=3 a1=7fff629a3030 a2=0 a3=7fff629a301c items=0 ppid=3269 pid=3889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:21.201181 systemd[1]: Started cri-containerd-ce57f034a3486b51d2e2dc3c5b8acbb884c18b5f7335cf8a01b1ffab89847733.scope. Oct 2 19:27:21.224375 systemd[1]: run-containerd-runc-k8s.io-ce57f034a3486b51d2e2dc3c5b8acbb884c18b5f7335cf8a01b1ffab89847733-runc.2fmna2.mount: Deactivated successfully. Oct 2 19:27:21.258022 kubelet[2109]: E1002 19:27:21.257987 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.281000 audit: BPF prog-id=174 op=LOAD Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3831 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353766303334613334383662353164326532646333633562386163 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3831 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353766303334613334383662353164326532646333633562386163 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit: BPF prog-id=175 op=LOAD Oct 2 19:27:21.282000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ca790 items=0 ppid=3831 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353766303334613334383662353164326532646333633562386163 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.282000 audit: BPF prog-id=176 op=LOAD Oct 2 19:27:21.282000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ca7d8 items=0 ppid=3831 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353766303334613334383662353164326532646333633562386163 Oct 2 19:27:21.282000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:27:21.283000 audit: BPF prog-id=175 op=UNLOAD Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { perfmon } for pid=3894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit[3894]: AVC avc: denied { bpf } for pid=3894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.283000 audit: BPF prog-id=177 op=LOAD Oct 2 19:27:21.283000 audit[3894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cabe8 items=0 ppid=3831 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353766303334613334383662353164326532646333633562386163 Oct 2 19:27:21.335274 kubelet[2109]: I1002 19:27:21.332210 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-n9tff" podStartSLOduration=-9.223372008522621e+09 pod.CreationTimestamp="2023-10-02 19:26:53 +0000 UTC" firstStartedPulling="2023-10-02 19:27:17.742000649 +0000 UTC m=+42.126850408" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:27:21.331623249 +0000 UTC m=+45.716473000" watchObservedRunningTime="2023-10-02 19:27:21.332153828 +0000 UTC m=+45.717003586" Oct 2 19:27:21.359481 env[1138]: time="2023-10-02T19:27:21.359413617Z" level=info msg="StartContainer for \"ce57f034a3486b51d2e2dc3c5b8acbb884c18b5f7335cf8a01b1ffab89847733\" returns successfully" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.238 [INFO][3880] k8s.go 576: Cleaning up netns ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.239 [INFO][3880] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" iface="eth0" netns="/var/run/netns/cni-7209f252-c523-bfc6-e527-1a19326d662e" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.239 [INFO][3880] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" iface="eth0" netns="/var/run/netns/cni-7209f252-c523-bfc6-e527-1a19326d662e" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.239 [INFO][3880] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" iface="eth0" netns="/var/run/netns/cni-7209f252-c523-bfc6-e527-1a19326d662e" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.239 [INFO][3880] k8s.go 583: Releasing IP address(es) ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.239 [INFO][3880] utils.go 196: Calico CNI releasing IP address ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.403 [INFO][3908] ipam_plugin.go 416: Releasing address using handleID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.430029 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:21.430029 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.417 [WARNING][3908] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.417 [INFO][3908] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.430029 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:21.430029 env[1138]: 2023-10-02 19:27:21.425 [INFO][3880] k8s.go 589: Teardown processing complete. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:21.430890 env[1138]: time="2023-10-02T19:27:21.430423137Z" level=info msg="TearDown network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" successfully" Oct 2 19:27:21.430890 env[1138]: time="2023-10-02T19:27:21.430473053Z" level=info msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" returns successfully" Oct 2 19:27:21.432131 env[1138]: time="2023-10-02T19:27:21.431336046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fdj4r,Uid:99894ce5-e998-4615-b06d-f10b432f5a29,Namespace:kube-system,Attempt:1,}" Oct 2 19:27:21.660408 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:27:21.660566 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid138c682599: link becomes ready Oct 2 19:27:21.668435 systemd-networkd[1022]: calid138c682599: Link UP Oct 2 19:27:21.668446 systemd-networkd[1022]: calid138c682599: Gained carrier Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.521 [INFO][3956] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0 coredns-787d4945fb- kube-system 99894ce5-e998-4615-b06d-f10b432f5a29 706 0 2023-10-02 19:26:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal coredns-787d4945fb-fdj4r eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid138c682599 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.522 [INFO][3956] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.590 [INFO][3967] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" HandleID="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.605 [INFO][3967] ipam_plugin.go 269: Auto assigning IP ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" HandleID="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d7a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-fdj4r", "timestamp":"2023-10-02 19:27:21.59025749 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:21.690774 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:21.690774 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.605 [INFO][3967] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.608 [INFO][3967] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.614 [INFO][3967] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.619 [INFO][3967] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.621 [INFO][3967] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.625 [INFO][3967] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.625 [INFO][3967] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.628 [INFO][3967] ipam.go 1682: Creating new handle: k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.634 [INFO][3967] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.640 [INFO][3967] ipam.go 1216: Successfully claimed IPs: [192.168.52.196/26] block=192.168.52.192/26 handle="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.641 [INFO][3967] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.196/26] handle="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:21.690774 env[1138]: time="2023-10-02T19:27:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:21.690774 env[1138]: 2023-10-02 19:27:21.641 [INFO][3967] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.196/26] IPv6=[] ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" HandleID="k8s-pod-network.97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.644 [INFO][3956] k8s.go 383: Populated endpoint ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"99894ce5-e998-4615-b06d-f10b432f5a29", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-fdj4r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid138c682599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.644 [INFO][3956] k8s.go 384: Calico CNI using IPs: [192.168.52.196/32] ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.644 [INFO][3956] dataplane_linux.go 68: Setting the host side veth name to calid138c682599 ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.660 [INFO][3956] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.669 [INFO][3956] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"99894ce5-e998-4615-b06d-f10b432f5a29", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c", Pod:"coredns-787d4945fb-fdj4r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid138c682599", MAC:"c6:c5:42:37:f2:d7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:21.692071 env[1138]: 2023-10-02 19:27:21.685 [INFO][3956] k8s.go 489: Wrote updated endpoint to datastore ContainerID="97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c" Namespace="kube-system" Pod="coredns-787d4945fb-fdj4r" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:21.718536 env[1138]: time="2023-10-02T19:27:21.717372574Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:21.718536 env[1138]: time="2023-10-02T19:27:21.717522910Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:21.718536 env[1138]: time="2023-10-02T19:27:21.717589373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:21.719176 env[1138]: time="2023-10-02T19:27:21.718000444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c pid=3994 runtime=io.containerd.runc.v2 Oct 2 19:27:21.728000 audit[4004]: NETFILTER_CFG table=filter:120 family=2 entries=34 op=nft_register_chain pid=4004 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:21.728000 audit[4004]: SYSCALL arch=c000003e syscall=46 success=yes exit=17884 a0=3 a1=7ffd5fa58cd0 a2=0 a3=7ffd5fa58cbc items=0 ppid=3269 pid=4004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.728000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:21.749617 systemd[1]: Started cri-containerd-97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c.scope. Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.773000 audit: BPF prog-id=178 op=LOAD Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3994 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616163363565356164373066383665343539306563373332623363 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3994 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616163363565356164373066383665343539306563373332623363 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit: BPF prog-id=179 op=LOAD Oct 2 19:27:21.774000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f6be0 items=0 ppid=3994 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616163363565356164373066383665343539306563373332623363 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit: BPF prog-id=180 op=LOAD Oct 2 19:27:21.774000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f6c28 items=0 ppid=3994 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616163363565356164373066383665343539306563373332623363 Oct 2 19:27:21.774000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:27:21.774000 audit: BPF prog-id=179 op=UNLOAD Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { perfmon } for pid=4003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit[4003]: AVC avc: denied { bpf } for pid=4003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.774000 audit: BPF prog-id=181 op=LOAD Oct 2 19:27:21.774000 audit[4003]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f7038 items=0 ppid=3994 pid=4003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937616163363565356164373066383665343539306563373332623363 Oct 2 19:27:21.818361 env[1138]: time="2023-10-02T19:27:21.818306119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fdj4r,Uid:99894ce5-e998-4615-b06d-f10b432f5a29,Namespace:kube-system,Attempt:1,} returns sandbox id \"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c\"" Oct 2 19:27:21.822889 env[1138]: time="2023-10-02T19:27:21.822842235Z" level=info msg="CreateContainer within sandbox \"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:27:21.847236 env[1138]: time="2023-10-02T19:27:21.847168456Z" level=info msg="CreateContainer within sandbox \"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6948258161e475456d21678c93db77c32bafd7215a35b2b882dfb10685ab2754\"" Oct 2 19:27:21.847996 env[1138]: time="2023-10-02T19:27:21.847937375Z" level=info msg="StartContainer for \"6948258161e475456d21678c93db77c32bafd7215a35b2b882dfb10685ab2754\"" Oct 2 19:27:21.873958 systemd[1]: Started cri-containerd-6948258161e475456d21678c93db77c32bafd7215a35b2b882dfb10685ab2754.scope. Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.902000 audit: BPF prog-id=182 op=LOAD Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3994 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343832353831363165343735343536643231363738633933646237 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3994 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343832353831363165343735343536643231363738633933646237 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit: BPF prog-id=183 op=LOAD Oct 2 19:27:21.906000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001efbc0 items=0 ppid=3994 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343832353831363165343735343536643231363738633933646237 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.906000 audit: BPF prog-id=184 op=LOAD Oct 2 19:27:21.906000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001efc08 items=0 ppid=3994 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343832353831363165343735343536643231363738633933646237 Oct 2 19:27:21.907000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:27:21.907000 audit: BPF prog-id=183 op=UNLOAD Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:21.907000 audit: BPF prog-id=185 op=LOAD Oct 2 19:27:21.907000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6018 items=0 ppid=3994 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:21.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343832353831363165343735343536643231363738633933646237 Oct 2 19:27:21.936182 env[1138]: time="2023-10-02T19:27:21.936119011Z" level=info msg="StartContainer for \"6948258161e475456d21678c93db77c32bafd7215a35b2b882dfb10685ab2754\" returns successfully" Oct 2 19:27:22.102313 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.GGWBQg.mount: Deactivated successfully. Oct 2 19:27:22.102473 systemd[1]: run-netns-cni\x2d7209f252\x2dc523\x2dbfc6\x2de527\x2d1a19326d662e.mount: Deactivated successfully. Oct 2 19:27:22.283150 kubelet[2109]: E1002 19:27:22.283116 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:22.298539 kubelet[2109]: I1002 19:27:22.298499 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-q6jtb" podStartSLOduration=34.298443944 pod.CreationTimestamp="2023-10-02 19:26:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:27:22.296688318 +0000 UTC m=+46.681538067" watchObservedRunningTime="2023-10-02 19:27:22.298443944 +0000 UTC m=+46.683293697" Oct 2 19:27:22.366899 kubelet[2109]: I1002 19:27:22.366767 2109 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-fdj4r" podStartSLOduration=34.36670978 pod.CreationTimestamp="2023-10-02 19:26:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:27:22.360595245 +0000 UTC m=+46.745445016" watchObservedRunningTime="2023-10-02 19:27:22.36670978 +0000 UTC m=+46.751559530" Oct 2 19:27:22.430331 systemd-networkd[1022]: cali774dec90b00: Gained IPv6LL Oct 2 19:27:22.463000 audit[4099]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=4099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.463000 audit[4099]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe5f7a7410 a2=0 a3=7ffe5f7a73fc items=0 ppid=2306 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.466000 audit[4099]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=4099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.466000 audit[4099]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffe5f7a7410 a2=0 a3=7ffe5f7a73fc items=0 ppid=2306 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.595183 kernel: kauditd_printk_skb: 407 callbacks suppressed Oct 2 19:27:22.595379 kernel: audit: type=1325 audit(1696274842.583:1352): table=filter:123 family=2 entries=9 op=nft_register_rule pid=4125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.583000 audit[4125]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.583000 audit[4125]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffffef89e10 a2=0 a3=7ffffef89dfc items=0 ppid=2306 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.641219 kernel: audit: type=1300 audit(1696274842.583:1352): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffffef89e10 a2=0 a3=7ffffef89dfc items=0 ppid=2306 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.660323 kernel: audit: type=1327 audit(1696274842.583:1352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.651000 audit[4125]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=4125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.678112 kernel: audit: type=1325 audit(1696274842.651:1353): table=nat:124 family=2 entries=51 op=nft_register_chain pid=4125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:22.678268 kernel: audit: type=1300 audit(1696274842.651:1353): arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffffef89e10 a2=0 a3=7ffffef89dfc items=0 ppid=2306 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.651000 audit[4125]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffffef89e10 a2=0 a3=7ffffef89dfc items=0 ppid=2306 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:22.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.732118 kernel: audit: type=1327 audit(1696274842.651:1353): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:22.814715 systemd-networkd[1022]: calia91b04a2fb2: Gained IPv6LL Oct 2 19:27:23.198819 systemd-networkd[1022]: calid138c682599: Gained IPv6LL Oct 2 19:27:23.370390 kubelet[2109]: I1002 19:27:23.370341 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:23.378653 systemd[1]: Created slice kubepods-besteffort-podd0dbe630_c65f_4c1b_85d0_b1d83939186f.slice. Oct 2 19:27:23.389235 kubelet[2109]: W1002 19:27:23.389198 2109 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:23.389544 kubelet[2109]: E1002 19:27:23.389511 2109 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:23.390070 kubelet[2109]: W1002 19:27:23.390031 2109 reflector.go:424] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:23.390287 kubelet[2109]: E1002 19:27:23.390264 2109 reflector.go:140] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' and this object Oct 2 19:27:23.406134 kubelet[2109]: I1002 19:27:23.406066 2109 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:27:23.414887 systemd[1]: Created slice kubepods-besteffort-pod1ec74be6_cf04_4aff_806e_a149cf8c8889.slice. Oct 2 19:27:23.520426 kubelet[2109]: I1002 19:27:23.520290 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d0dbe630-c65f-4c1b-85d0-b1d83939186f-calico-apiserver-certs\") pod \"calico-apiserver-75975b5c9-cccn4\" (UID: \"d0dbe630-c65f-4c1b-85d0-b1d83939186f\") " pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" Oct 2 19:27:23.520426 kubelet[2109]: I1002 19:27:23.520374 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1ec74be6-cf04-4aff-806e-a149cf8c8889-calico-apiserver-certs\") pod \"calico-apiserver-75975b5c9-5hmhz\" (UID: \"1ec74be6-cf04-4aff-806e-a149cf8c8889\") " pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" Oct 2 19:27:23.520426 kubelet[2109]: I1002 19:27:23.520421 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mt2r4\" (UniqueName: \"kubernetes.io/projected/1ec74be6-cf04-4aff-806e-a149cf8c8889-kube-api-access-mt2r4\") pod \"calico-apiserver-75975b5c9-5hmhz\" (UID: \"1ec74be6-cf04-4aff-806e-a149cf8c8889\") " pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" Oct 2 19:27:23.520744 kubelet[2109]: I1002 19:27:23.520461 2109 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6qdgm\" (UniqueName: \"kubernetes.io/projected/d0dbe630-c65f-4c1b-85d0-b1d83939186f-kube-api-access-6qdgm\") pod \"calico-apiserver-75975b5c9-cccn4\" (UID: \"d0dbe630-c65f-4c1b-85d0-b1d83939186f\") " pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" Oct 2 19:27:23.547000 audit[4155]: NETFILTER_CFG table=filter:125 family=2 entries=7 op=nft_register_rule pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:23.599663 kernel: audit: type=1325 audit(1696274843.547:1354): table=filter:125 family=2 entries=7 op=nft_register_rule pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:23.599850 kernel: audit: type=1300 audit(1696274843.547:1354): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc58eac5a0 a2=0 a3=7ffc58eac58c items=0 ppid=2306 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:23.547000 audit[4155]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc58eac5a0 a2=0 a3=7ffc58eac58c items=0 ppid=2306 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:23.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:23.617809 kernel: audit: type=1327 audit(1696274843.547:1354): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:23.624000 audit[4155]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:23.642097 kernel: audit: type=1325 audit(1696274843.624:1355): table=nat:126 family=2 entries=72 op=nft_register_chain pid=4155 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:23.624000 audit[4155]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc58eac5a0 a2=0 a3=7ffc58eac58c items=0 ppid=2306 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:23.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:24.714000 audit[4187]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:24.714000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff14daec70 a2=0 a3=7fff14daec5c items=0 ppid=2306 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:24.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:24.718000 audit[4187]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:24.718000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff14daec70 a2=0 a3=7fff14daec5c items=0 ppid=2306 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:24.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:24.885001 env[1138]: time="2023-10-02T19:27:24.884918061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75975b5c9-cccn4,Uid:d0dbe630-c65f-4c1b-85d0-b1d83939186f,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:27:24.921848 env[1138]: time="2023-10-02T19:27:24.921786389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75975b5c9-5hmhz,Uid:1ec74be6-cf04-4aff-806e-a149cf8c8889,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:27:25.227138 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:27:25.227305 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali38352e68109: link becomes ready Oct 2 19:27:25.247067 systemd-networkd[1022]: cali38352e68109: Link UP Oct 2 19:27:25.247139 systemd-networkd[1022]: cali38352e68109: Gained carrier Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.001 [INFO][4190] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0 calico-apiserver-75975b5c9- calico-apiserver d0dbe630-c65f-4c1b-85d0-b1d83939186f 789 0 2023-10-02 19:27:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75975b5c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal calico-apiserver-75975b5c9-cccn4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali38352e68109 [] []}} ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.001 [INFO][4190] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.132 [INFO][4210] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" HandleID="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.154 [INFO][4210] ipam_plugin.go 269: Auto assigning IP ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" HandleID="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d840), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"calico-apiserver-75975b5c9-cccn4", "timestamp":"2023-10-02 19:27:25.131735371 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:25.263193 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:25.263193 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.154 [INFO][4210] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.157 [INFO][4210] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.162 [INFO][4210] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.170 [INFO][4210] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.180 [INFO][4210] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.186 [INFO][4210] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.186 [INFO][4210] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.189 [INFO][4210] ipam.go 1682: Creating new handle: k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6 Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.195 [INFO][4210] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.204 [INFO][4210] ipam.go 1216: Successfully claimed IPs: [192.168.52.197/26] block=192.168.52.192/26 handle="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.204 [INFO][4210] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.197/26] handle="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.263193 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:25.263193 env[1138]: 2023-10-02 19:27:25.204 [INFO][4210] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.197/26] IPv6=[] ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" HandleID="k8s-pod-network.884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.210 [INFO][4190] k8s.go 383: Populated endpoint ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0", GenerateName:"calico-apiserver-75975b5c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0dbe630-c65f-4c1b-85d0-b1d83939186f", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75975b5c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-75975b5c9-cccn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.52.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali38352e68109", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.210 [INFO][4190] k8s.go 384: Calico CNI using IPs: [192.168.52.197/32] ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.210 [INFO][4190] dataplane_linux.go 68: Setting the host side veth name to cali38352e68109 ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.232 [INFO][4190] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.245 [INFO][4190] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0", GenerateName:"calico-apiserver-75975b5c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0dbe630-c65f-4c1b-85d0-b1d83939186f", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75975b5c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6", Pod:"calico-apiserver-75975b5c9-cccn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.52.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali38352e68109", MAC:"16:e2:89:cf:43:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:25.264570 env[1138]: 2023-10-02 19:27:25.257 [INFO][4190] k8s.go 489: Wrote updated endpoint to datastore ContainerID="884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-cccn4" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--cccn4-eth0" Oct 2 19:27:25.359194 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali38cd39063bf: link becomes ready Oct 2 19:27:25.368042 env[1138]: time="2023-10-02T19:27:25.367939888Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:25.368558 env[1138]: time="2023-10-02T19:27:25.368464965Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:25.368853 env[1138]: time="2023-10-02T19:27:25.368761367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:25.369455 env[1138]: time="2023-10-02T19:27:25.369357515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6 pid=4254 runtime=io.containerd.runc.v2 Oct 2 19:27:25.382897 systemd-networkd[1022]: cali38cd39063bf: Link UP Oct 2 19:27:25.382913 systemd-networkd[1022]: cali38cd39063bf: Gained carrier Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.061 [INFO][4199] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0 calico-apiserver-75975b5c9- calico-apiserver 1ec74be6-cf04-4aff-806e-a149cf8c8889 799 0 2023-10-02 19:27:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75975b5c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal calico-apiserver-75975b5c9-5hmhz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali38cd39063bf [] []}} ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.061 [INFO][4199] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.181 [INFO][4216] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" HandleID="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.197 [INFO][4216] ipam_plugin.go 269: Auto assigning IP ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" HandleID="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dee0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", "pod":"calico-apiserver-75975b5c9-5hmhz", "timestamp":"2023-10-02 19:27:25.18167926 +0000 UTC"}, Hostname:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:27:25.416459 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:25.416459 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.234 [INFO][4216] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal' Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.238 [INFO][4216] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.248 [INFO][4216] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.269 [INFO][4216] ipam.go 489: Trying affinity for 192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.277 [INFO][4216] ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.288 [INFO][4216] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.288 [INFO][4216] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.295 [INFO][4216] ipam.go 1682: Creating new handle: k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1 Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.310 [INFO][4216] ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.336 [INFO][4216] ipam.go 1216: Successfully claimed IPs: [192.168.52.198/26] block=192.168.52.192/26 handle="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.336 [INFO][4216] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.198/26] handle="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" host="ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal" Oct 2 19:27:25.416459 env[1138]: time="2023-10-02T19:27:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:25.416459 env[1138]: 2023-10-02 19:27:25.337 [INFO][4216] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.52.198/26] IPv6=[] ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" HandleID="k8s-pod-network.e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.348 [INFO][4199] k8s.go 383: Populated endpoint ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0", GenerateName:"calico-apiserver-75975b5c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ec74be6-cf04-4aff-806e-a149cf8c8889", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75975b5c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-75975b5c9-5hmhz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.52.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali38cd39063bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.348 [INFO][4199] k8s.go 384: Calico CNI using IPs: [192.168.52.198/32] ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.348 [INFO][4199] dataplane_linux.go 68: Setting the host side veth name to cali38cd39063bf ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.366 [INFO][4199] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.386 [INFO][4199] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0", GenerateName:"calico-apiserver-75975b5c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ec74be6-cf04-4aff-806e-a149cf8c8889", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75975b5c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1", Pod:"calico-apiserver-75975b5c9-5hmhz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.52.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali38cd39063bf", MAC:"0e:e3:4b:df:60:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:25.420653 env[1138]: 2023-10-02 19:27:25.413 [INFO][4199] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1" Namespace="calico-apiserver" Pod="calico-apiserver-75975b5c9-5hmhz" WorkloadEndpoint="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--apiserver--75975b5c9--5hmhz-eth0" Oct 2 19:27:25.448254 systemd[1]: Started cri-containerd-884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6.scope. Oct 2 19:27:25.480048 systemd[1]: run-containerd-runc-k8s.io-884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6-runc.ED0ztb.mount: Deactivated successfully. Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.575000 audit: BPF prog-id=186 op=LOAD Oct 2 19:27:25.577000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.577000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4254 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343134336265343361613866383766666637346436303338333530 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4254 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343134336265343361613866383766666637346436303338333530 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.578000 audit: BPF prog-id=187 op=LOAD Oct 2 19:27:25.578000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8fa0 items=0 ppid=4254 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343134336265343361613866383766666637346436303338333530 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.581000 audit: BPF prog-id=188 op=LOAD Oct 2 19:27:25.581000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8fe8 items=0 ppid=4254 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343134336265343361613866383766666637346436303338333530 Oct 2 19:27:25.582000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:27:25.583000 audit: BPF prog-id=187 op=UNLOAD Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { perfmon } for pid=4270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit[4270]: AVC avc: denied { bpf } for pid=4270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.583000 audit: BPF prog-id=189 op=LOAD Oct 2 19:27:25.583000 audit[4270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c93f8 items=0 ppid=4254 pid=4270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343134336265343361613866383766666637346436303338333530 Oct 2 19:27:25.589069 env[1138]: time="2023-10-02T19:27:25.588927131Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:27:25.571000 audit[4312]: NETFILTER_CFG table=filter:129 family=2 entries=55 op=nft_register_chain pid=4312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:25.571000 audit[4312]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffe91077310 a2=0 a3=7ffe910772fc items=0 ppid=3269 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:25.589909 env[1138]: time="2023-10-02T19:27:25.589843895Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:27:25.590135 env[1138]: time="2023-10-02T19:27:25.590066852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:27:25.590551 env[1138]: time="2023-10-02T19:27:25.590499640Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1 pid=4319 runtime=io.containerd.runc.v2 Oct 2 19:27:25.617588 systemd[1]: Started cri-containerd-e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1.scope. Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit: BPF prog-id=190 op=LOAD Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4319 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616139633766343333626536616166633134333834653035363232 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4319 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616139633766343333626536616166633134333834653035363232 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.713000 audit: BPF prog-id=191 op=LOAD Oct 2 19:27:25.713000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c86f0 items=0 ppid=4319 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616139633766343333626536616166633134333834653035363232 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit: BPF prog-id=192 op=LOAD Oct 2 19:27:25.714000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8738 items=0 ppid=4319 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616139633766343333626536616166633134333834653035363232 Oct 2 19:27:25.714000 audit: BPF prog-id=192 op=UNLOAD Oct 2 19:27:25.714000 audit: BPF prog-id=191 op=UNLOAD Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:27:25.714000 audit: BPF prog-id=193 op=LOAD Oct 2 19:27:25.714000 audit[4335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c8b48 items=0 ppid=4319 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539616139633766343333626536616166633134333834653035363232 Oct 2 19:27:25.736811 env[1138]: time="2023-10-02T19:27:25.736669158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75975b5c9-cccn4,Uid:d0dbe630-c65f-4c1b-85d0-b1d83939186f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"884143be43aa8f87fff74d603835058c3081462e5b519fa09b9af735df4aa9f6\"" Oct 2 19:27:25.739618 env[1138]: time="2023-10-02T19:27:25.739573447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:27:25.825383 env[1138]: time="2023-10-02T19:27:25.825317503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75975b5c9-5hmhz,Uid:1ec74be6-cf04-4aff-806e-a149cf8c8889,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e9aa9c7f433be6aafc14384e05622e6478fa922f784b6b3ae9992e2e7aed9ee1\"" Oct 2 19:27:25.860000 audit[4373]: NETFILTER_CFG table=filter:130 family=2 entries=52 op=nft_register_chain pid=4373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:27:25.860000 audit[4373]: SYSCALL arch=c000003e syscall=46 success=yes exit=26144 a0=3 a1=7ffc263e2e50 a2=0 a3=7ffc263e2e3c items=0 ppid=3269 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:25.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:27:25.898036 env[1138]: time="2023-10-02T19:27:25.897962423Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:25.901627 env[1138]: time="2023-10-02T19:27:25.901553361Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:25.902994 kubelet[2109]: E1002 19:27:25.902205 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:25.902994 kubelet[2109]: E1002 19:27:25.902283 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:25.902994 kubelet[2109]: E1002 19:27:25.902489 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-6qdgm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-cccn4_calico-apiserver(d0dbe630-c65f-4c1b-85d0-b1d83939186f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:25.902994 kubelet[2109]: E1002 19:27:25.902550 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:27:25.904434 env[1138]: time="2023-10-02T19:27:25.904393540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:27:26.035336 env[1138]: time="2023-10-02T19:27:26.035235000Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:26.041934 env[1138]: time="2023-10-02T19:27:26.041864420Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:26.043011 kubelet[2109]: E1002 19:27:26.042444 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:26.043011 kubelet[2109]: E1002 19:27:26.042506 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:26.043011 kubelet[2109]: E1002 19:27:26.042642 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mt2r4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-5hmhz_calico-apiserver(1ec74be6-cf04-4aff-806e-a149cf8c8889): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:26.043011 kubelet[2109]: E1002 19:27:26.042699 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:27:26.300057 kubelet[2109]: E1002 19:27:26.298922 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:27:26.303155 kubelet[2109]: E1002 19:27:26.302893 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:27:26.393000 audit[4400]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:26.393000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff5bd7ce20 a2=0 a3=7fff5bd7ce0c items=0 ppid=2306 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:26.396000 audit[4400]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:26.396000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff5bd7ce20 a2=0 a3=7fff5bd7ce0c items=0 ppid=2306 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:26.452989 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.H0Fm2P.mount: Deactivated successfully. Oct 2 19:27:26.466000 audit[4426]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:26.466000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff55f81ac0 a2=0 a3=7fff55f81aac items=0 ppid=2306 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:26.469000 audit[4426]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:27:26.469000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff55f81ac0 a2=0 a3=7fff55f81aac items=0 ppid=2306 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:26.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:27:26.526625 systemd-networkd[1022]: cali38cd39063bf: Gained IPv6LL Oct 2 19:27:27.166784 systemd-networkd[1022]: cali38352e68109: Gained IPv6LL Oct 2 19:27:27.305565 kubelet[2109]: E1002 19:27:27.305513 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:27:27.306140 kubelet[2109]: E1002 19:27:27.305981 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:27:31.870000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.876767 kernel: kauditd_printk_skb: 140 callbacks suppressed Oct 2 19:27:31.876934 kernel: audit: type=1400 audit(1696274851.870:1401): avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.870000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.903127 kernel: audit: type=1400 audit(1696274851.870:1400): avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.870000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0019a32e0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.965408 kernel: audit: type=1300 audit(1696274851.870:1401): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0019a32e0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.995670 kernel: audit: type=1327 audit(1696274851.870:1401): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.995877 kernel: audit: type=1300 audit(1696274851.870:1400): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c005481e90 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.870000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c005481e90 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:32.031163 kernel: audit: type=1327 audit(1696274851.870:1400): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.870000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.872000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:32.063147 kernel: audit: type=1400 audit(1696274851.872:1402): avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.872000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005481ef0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:32.123470 kernel: audit: type=1300 audit(1696274851.872:1402): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005481ef0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.872000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:32.153618 kernel: audit: type=1327 audit(1696274851.872:1402): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:32.153786 kernel: audit: type=1400 audit(1696274851.897:1403): avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7092 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.897000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7092 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.897000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0057221e0 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.897000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.899000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.899000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c005481f80 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:31.899000 audit[1960]: AVC avc: denied { watch } for pid=1960 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:31.899000 audit[1960]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0019d1d40 a2=fc6 a3=0 items=0 ppid=1851 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c121,c768 key=(null) Oct 2 19:27:31.899000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3835002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:27:33.160000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:33.160000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000efb880 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:33.160000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:33.179000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7090 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:33.179000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002125680 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:33.179000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:35.019000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:35.019000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:35.019000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012fa040 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:35.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:35.019000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014dbec0 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:35.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:35.020000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:35.020000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014dbee0 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:35.020000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:35.036403 env[1138]: time="2023-10-02T19:27:35.035898718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:27:35.039000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6815 scontext=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:27:35.039000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012fa440 a2=fc6 a3=0 items=0 ppid=1798 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c424,c571 key=(null) Oct 2 19:27:35.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:27:35.159147 env[1138]: time="2023-10-02T19:27:35.159044225Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:35.161279 env[1138]: time="2023-10-02T19:27:35.161138088Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:35.161559 kubelet[2109]: E1002 19:27:35.161525 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:35.162060 kubelet[2109]: E1002 19:27:35.161589 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:35.162060 kubelet[2109]: E1002 19:27:35.161726 2109 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:35.163626 env[1138]: time="2023-10-02T19:27:35.163327807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:27:35.273524 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.fsxbZQ.mount: Deactivated successfully. Oct 2 19:27:35.290028 env[1138]: time="2023-10-02T19:27:35.289928932Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:35.298866 env[1138]: time="2023-10-02T19:27:35.298791606Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:35.299146 kubelet[2109]: E1002 19:27:35.299072 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:35.299248 kubelet[2109]: E1002 19:27:35.299161 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:35.299328 kubelet[2109]: E1002 19:27:35.299309 2109 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:35.299598 kubelet[2109]: E1002 19:27:35.299393 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:35.925814 env[1138]: time="2023-10-02T19:27:35.925748511Z" level=info msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:35.976 [WARNING][4523] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"adcbea21-b24b-4a1f-82dd-62940b93bfb5", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697", Pod:"calico-kube-controllers-69c848ddc6-n9tff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7787e19a5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:35.977 [INFO][4523] k8s.go 576: Cleaning up netns ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:35.977 [INFO][4523] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" iface="eth0" netns="" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:35.977 [INFO][4523] k8s.go 583: Releasing IP address(es) ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:35.977 [INFO][4523] utils.go 196: Calico CNI releasing IP address ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:36.009 [INFO][4529] ipam_plugin.go 416: Releasing address using handleID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.023325 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.023325 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:36.018 [WARNING][4529] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:36.018 [INFO][4529] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.023325 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.023325 env[1138]: 2023-10-02 19:27:36.022 [INFO][4523] k8s.go 589: Teardown processing complete. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.023995 env[1138]: time="2023-10-02T19:27:36.023365970Z" level=info msg="TearDown network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" successfully" Oct 2 19:27:36.023995 env[1138]: time="2023-10-02T19:27:36.023411584Z" level=info msg="StopPodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" returns successfully" Oct 2 19:27:36.024923 env[1138]: time="2023-10-02T19:27:36.024870429Z" level=info msg="RemovePodSandbox for \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" Oct 2 19:27:36.025142 env[1138]: time="2023-10-02T19:27:36.024930406Z" level=info msg="Forcibly stopping sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\"" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.086 [WARNING][4548] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"adcbea21-b24b-4a1f-82dd-62940b93bfb5", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"fca95d371a1c393af49026447cb59b0a549c148d1bb4c21ac722ad46e2dc4697", Pod:"calico-kube-controllers-69c848ddc6-n9tff", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7787e19a5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.086 [INFO][4548] k8s.go 576: Cleaning up netns ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.086 [INFO][4548] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" iface="eth0" netns="" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.086 [INFO][4548] k8s.go 583: Releasing IP address(es) ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.086 [INFO][4548] utils.go 196: Calico CNI releasing IP address ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.121 [INFO][4555] ipam_plugin.go 416: Releasing address using handleID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.144220 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.144220 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.131 [WARNING][4555] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.131 [INFO][4555] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" HandleID="k8s-pod-network.fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-calico--kube--controllers--69c848ddc6--n9tff-eth0" Oct 2 19:27:36.144220 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.144220 env[1138]: 2023-10-02 19:27:36.134 [INFO][4548] k8s.go 589: Teardown processing complete. ContainerID="fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44" Oct 2 19:27:36.145609 env[1138]: time="2023-10-02T19:27:36.145531388Z" level=info msg="TearDown network for sandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" successfully" Oct 2 19:27:36.151317 env[1138]: time="2023-10-02T19:27:36.151252917Z" level=info msg="RemovePodSandbox \"fa769f8d86b52e14696ddb63867729c7915f1daaa65b74f2b3960e48ef150c44\" returns successfully" Oct 2 19:27:36.151997 env[1138]: time="2023-10-02T19:27:36.151946239Z" level=info msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" Oct 2 19:27:36.224972 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.2k6vUi.mount: Deactivated successfully. Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.210 [WARNING][4573] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"eb8f0de9-95fc-490b-8b49-6717d175e71b", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7", Pod:"coredns-787d4945fb-q6jtb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia91b04a2fb2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.211 [INFO][4573] k8s.go 576: Cleaning up netns ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.211 [INFO][4573] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" iface="eth0" netns="" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.211 [INFO][4573] k8s.go 583: Releasing IP address(es) ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.211 [INFO][4573] utils.go 196: Calico CNI releasing IP address ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.282 [INFO][4579] ipam_plugin.go 416: Releasing address using handleID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.297697 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.297697 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.292 [WARNING][4579] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.292 [INFO][4579] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.297697 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.297697 env[1138]: 2023-10-02 19:27:36.296 [INFO][4573] k8s.go 589: Teardown processing complete. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.298742 env[1138]: time="2023-10-02T19:27:36.298691054Z" level=info msg="TearDown network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" successfully" Oct 2 19:27:36.298879 env[1138]: time="2023-10-02T19:27:36.298843209Z" level=info msg="StopPodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" returns successfully" Oct 2 19:27:36.299522 env[1138]: time="2023-10-02T19:27:36.299482145Z" level=info msg="RemovePodSandbox for \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" Oct 2 19:27:36.299668 env[1138]: time="2023-10-02T19:27:36.299531602Z" level=info msg="Forcibly stopping sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\"" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.371 [WARNING][4598] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"eb8f0de9-95fc-490b-8b49-6717d175e71b", ResourceVersion:"732", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"c4f2f746ad4430b11e47e59e1d08c72707ddf0519f8c5ea60e277557526659e7", Pod:"coredns-787d4945fb-q6jtb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia91b04a2fb2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.371 [INFO][4598] k8s.go 576: Cleaning up netns ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.371 [INFO][4598] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" iface="eth0" netns="" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.371 [INFO][4598] k8s.go 583: Releasing IP address(es) ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.371 [INFO][4598] utils.go 196: Calico CNI releasing IP address ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.399 [INFO][4604] ipam_plugin.go 416: Releasing address using handleID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.413869 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.413869 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.408 [WARNING][4604] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.408 [INFO][4604] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" HandleID="k8s-pod-network.ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--q6jtb-eth0" Oct 2 19:27:36.413869 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.413869 env[1138]: 2023-10-02 19:27:36.412 [INFO][4598] k8s.go 589: Teardown processing complete. ContainerID="ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2" Oct 2 19:27:36.414747 env[1138]: time="2023-10-02T19:27:36.413912283Z" level=info msg="TearDown network for sandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" successfully" Oct 2 19:27:36.420147 env[1138]: time="2023-10-02T19:27:36.420066184Z" level=info msg="RemovePodSandbox \"ec967098937b91fc3e54bacb46f45f137364e67c0a0b28e31449828513ff8bd2\" returns successfully" Oct 2 19:27:36.421179 env[1138]: time="2023-10-02T19:27:36.421120482Z" level=info msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.469 [WARNING][4623] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"99894ce5-e998-4615-b06d-f10b432f5a29", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c", Pod:"coredns-787d4945fb-fdj4r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid138c682599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.474 [INFO][4623] k8s.go 576: Cleaning up netns ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.474 [INFO][4623] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" iface="eth0" netns="" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.474 [INFO][4623] k8s.go 583: Releasing IP address(es) ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.474 [INFO][4623] utils.go 196: Calico CNI releasing IP address ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.505 [INFO][4629] ipam_plugin.go 416: Releasing address using handleID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.515 [WARNING][4629] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.515 [INFO][4629] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.522498 env[1138]: 2023-10-02 19:27:36.519 [INFO][4623] k8s.go 589: Teardown processing complete. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36.521214494Z" level=info msg="TearDown network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" successfully" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36.521279500Z" level=info msg="StopPodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" returns successfully" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36.522040554Z" level=info msg="RemovePodSandbox for \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" Oct 2 19:27:36.522498 env[1138]: time="2023-10-02T19:27:36.522112406Z" level=info msg="Forcibly stopping sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\"" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.571 [WARNING][4651] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"99894ce5-e998-4615-b06d-f10b432f5a29", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 26, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"97aac65e5ad70f86e4590ec732b3c370ab146c6bbe1be81f0102b364fe63ed0c", Pod:"coredns-787d4945fb-fdj4r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid138c682599", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.572 [INFO][4651] k8s.go 576: Cleaning up netns ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.572 [INFO][4651] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" iface="eth0" netns="" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.572 [INFO][4651] k8s.go 583: Releasing IP address(es) ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.572 [INFO][4651] utils.go 196: Calico CNI releasing IP address ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.600 [INFO][4657] ipam_plugin.go 416: Releasing address using handleID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.615190 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.615190 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.608 [WARNING][4657] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.609 [INFO][4657] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" HandleID="k8s-pod-network.c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-coredns--787d4945fb--fdj4r-eth0" Oct 2 19:27:36.615190 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.615190 env[1138]: 2023-10-02 19:27:36.613 [INFO][4651] k8s.go 589: Teardown processing complete. ContainerID="c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8" Oct 2 19:27:36.616694 env[1138]: time="2023-10-02T19:27:36.616642830Z" level=info msg="TearDown network for sandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" successfully" Oct 2 19:27:36.625486 env[1138]: time="2023-10-02T19:27:36.625421874Z" level=info msg="RemovePodSandbox \"c7604dfae5068926e10af6da140734b9e2742a809e8680b2b2c69dbd13c827b8\" returns successfully" Oct 2 19:27:36.626224 env[1138]: time="2023-10-02T19:27:36.626182469Z" level=info msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.675 [WARNING][4676] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ab7e09b4-bb1a-4cbe-848e-4073bffc883d", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085", Pod:"csi-node-driver-n9mv2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali774dec90b00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.676 [INFO][4676] k8s.go 576: Cleaning up netns ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.676 [INFO][4676] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" iface="eth0" netns="" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.676 [INFO][4676] k8s.go 583: Releasing IP address(es) ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.676 [INFO][4676] utils.go 196: Calico CNI releasing IP address ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.703 [INFO][4682] ipam_plugin.go 416: Releasing address using handleID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.718327 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.718327 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.713 [WARNING][4682] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.713 [INFO][4682] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.718327 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.718327 env[1138]: 2023-10-02 19:27:36.717 [INFO][4676] k8s.go 589: Teardown processing complete. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.719223 env[1138]: time="2023-10-02T19:27:36.718379385Z" level=info msg="TearDown network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" successfully" Oct 2 19:27:36.719223 env[1138]: time="2023-10-02T19:27:36.718421798Z" level=info msg="StopPodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" returns successfully" Oct 2 19:27:36.719223 env[1138]: time="2023-10-02T19:27:36.719004904Z" level=info msg="RemovePodSandbox for \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" Oct 2 19:27:36.719223 env[1138]: time="2023-10-02T19:27:36.719046240Z" level=info msg="Forcibly stopping sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\"" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.767 [WARNING][4701] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ab7e09b4-bb1a-4cbe-848e-4073bffc883d", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-661c92e745731175a9d6.c.flatcar-212911.internal", ContainerID:"d53a405d210155e7ee607f00cd88137492dbd8f17144a0c4095872e17595a085", Pod:"csi-node-driver-n9mv2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali774dec90b00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.767 [INFO][4701] k8s.go 576: Cleaning up netns ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.768 [INFO][4701] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" iface="eth0" netns="" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.768 [INFO][4701] k8s.go 583: Releasing IP address(es) ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.768 [INFO][4701] utils.go 196: Calico CNI releasing IP address ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.799 [INFO][4707] ipam_plugin.go 416: Releasing address using handleID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.814925 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:27:36.814925 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.810 [WARNING][4707] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.810 [INFO][4707] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" HandleID="k8s-pod-network.0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Workload="ci--3510--3--0--661c92e745731175a9d6.c.flatcar--212911.internal-k8s-csi--node--driver--n9mv2-eth0" Oct 2 19:27:36.814925 env[1138]: time="2023-10-02T19:27:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:27:36.814925 env[1138]: 2023-10-02 19:27:36.813 [INFO][4701] k8s.go 589: Teardown processing complete. ContainerID="0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58" Oct 2 19:27:36.815852 env[1138]: time="2023-10-02T19:27:36.814964228Z" level=info msg="TearDown network for sandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" successfully" Oct 2 19:27:36.820815 env[1138]: time="2023-10-02T19:27:36.820745845Z" level=info msg="RemovePodSandbox \"0d2853e68b9e1c5995108df77fb5cdd7384183185ce331caaf4ccd2c8ff32b58\" returns successfully" Oct 2 19:27:41.035336 env[1138]: time="2023-10-02T19:27:41.035280732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:27:41.164289 env[1138]: time="2023-10-02T19:27:41.164205096Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:41.166512 env[1138]: time="2023-10-02T19:27:41.166433687Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:41.167107 kubelet[2109]: E1002 19:27:41.166791 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:41.167107 kubelet[2109]: E1002 19:27:41.166854 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:41.167107 kubelet[2109]: E1002 19:27:41.167040 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-6qdgm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-cccn4_calico-apiserver(d0dbe630-c65f-4c1b-85d0-b1d83939186f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:41.168221 kubelet[2109]: E1002 19:27:41.167700 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:27:42.036294 env[1138]: time="2023-10-02T19:27:42.035577021Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:27:42.371445 env[1138]: time="2023-10-02T19:27:42.371113593Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:42.373205 env[1138]: time="2023-10-02T19:27:42.373021708Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:42.373507 kubelet[2109]: E1002 19:27:42.373457 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:42.373996 kubelet[2109]: E1002 19:27:42.373534 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:27:42.373996 kubelet[2109]: E1002 19:27:42.373780 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mt2r4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-5hmhz_calico-apiserver(1ec74be6-cf04-4aff-806e-a149cf8c8889): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:42.373996 kubelet[2109]: E1002 19:27:42.373947 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:27:45.232746 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.PhVMln.mount: Deactivated successfully. Oct 2 19:27:45.277181 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.eet3aA.mount: Deactivated successfully. Oct 2 19:27:46.226068 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.xchBrj.mount: Deactivated successfully. Oct 2 19:27:47.036873 kubelet[2109]: E1002 19:27:47.036837 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:27:47.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.85:22-147.75.109.163:40978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:47.429004 systemd[1]: Started sshd@7-10.128.0.85:22-147.75.109.163:40978.service. Oct 2 19:27:47.460193 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:27:47.460373 kernel: audit: type=1130 audit(1696274867.428:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.85:22-147.75.109.163:40978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:47.740000 audit[4787]: USER_ACCT pid=4787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.772127 kernel: audit: type=1101 audit(1696274867.740:1413): pid=4787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.772262 sshd[4787]: Accepted publickey for core from 147.75.109.163 port 40978 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:27:47.773420 sshd[4787]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:47.771000 audit[4787]: CRED_ACQ pid=4787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.806306 kernel: audit: type=1103 audit(1696274867.771:1414): pid=4787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.786222 systemd[1]: Started session-8.scope. Oct 2 19:27:47.787856 systemd-logind[1123]: New session 8 of user core. Oct 2 19:27:47.830164 kernel: audit: type=1006 audit(1696274867.771:1415): pid=4787 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:27:47.830345 kernel: audit: type=1300 audit(1696274867.771:1415): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff63c0d0b0 a2=3 a3=0 items=0 ppid=1 pid=4787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:47.771000 audit[4787]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff63c0d0b0 a2=3 a3=0 items=0 ppid=1 pid=4787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:47.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:47.868171 kernel: audit: type=1327 audit(1696274867.771:1415): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:47.806000 audit[4787]: USER_START pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.901435 kernel: audit: type=1105 audit(1696274867.806:1416): pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.810000 audit[4789]: CRED_ACQ pid=4789 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:47.932128 kernel: audit: type=1103 audit(1696274867.810:1417): pid=4789 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:48.181670 sshd[4787]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:48.182000 audit[4787]: USER_END pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:48.198590 systemd-logind[1123]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:27:48.200371 systemd[1]: sshd@7-10.128.0.85:22-147.75.109.163:40978.service: Deactivated successfully. Oct 2 19:27:48.201625 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:27:48.204059 systemd-logind[1123]: Removed session 8. Oct 2 19:27:48.192000 audit[4787]: CRED_DISP pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:48.243457 kernel: audit: type=1106 audit(1696274868.182:1418): pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:48.243685 kernel: audit: type=1104 audit(1696274868.192:1419): pid=4787 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:48.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.85:22-147.75.109.163:40978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:54.035124 kubelet[2109]: E1002 19:27:54.035090 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:27:54.037898 kubelet[2109]: E1002 19:27:54.037840 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:27:55.245819 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.hiQchJ.mount: Deactivated successfully. Oct 2 19:27:55.293223 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.1xGQJq.mount: Deactivated successfully. Oct 2 19:27:58.262067 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:27:58.262301 kernel: audit: type=1130 audit(1696274878.229:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.85:22-147.75.109.163:47270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:58.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.85:22-147.75.109.163:47270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:58.229494 systemd[1]: Started sshd@8-10.128.0.85:22-147.75.109.163:47270.service. Oct 2 19:27:58.528000 audit[4870]: USER_ACCT pid=4870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.560339 kernel: audit: type=1101 audit(1696274878.528:1422): pid=4870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.560410 sshd[4870]: Accepted publickey for core from 147.75.109.163 port 47270 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:27:58.561000 audit[4870]: CRED_ACQ pid=4870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.562639 sshd[4870]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:27:58.580915 systemd[1]: Started session-9.scope. Oct 2 19:27:58.583530 systemd-logind[1123]: New session 9 of user core. Oct 2 19:27:58.589792 kernel: audit: type=1103 audit(1696274878.561:1423): pid=4870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.608301 kernel: audit: type=1006 audit(1696274878.561:1424): pid=4870 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:27:58.608494 kernel: audit: type=1300 audit(1696274878.561:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb6f7a60 a2=3 a3=0 items=0 ppid=1 pid=4870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:58.561000 audit[4870]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdb6f7a60 a2=3 a3=0 items=0 ppid=1 pid=4870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:27:58.561000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:58.593000 audit[4870]: USER_START pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.647183 kernel: audit: type=1327 audit(1696274878.561:1424): proctitle=737368643A20636F7265205B707269765D Oct 2 19:27:58.647252 kernel: audit: type=1105 audit(1696274878.593:1425): pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.680237 kernel: audit: type=1103 audit(1696274878.596:1426): pid=4872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.596000 audit[4872]: CRED_ACQ pid=4872 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.897830 sshd[4870]: pam_unix(sshd:session): session closed for user core Oct 2 19:27:58.899000 audit[4870]: USER_END pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.934234 kernel: audit: type=1106 audit(1696274878.899:1427): pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.934000 audit[4870]: CRED_DISP pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.941706 systemd[1]: sshd@8-10.128.0.85:22-147.75.109.163:47270.service: Deactivated successfully. Oct 2 19:27:58.943009 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:27:58.945601 systemd-logind[1123]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:27:58.947377 systemd-logind[1123]: Removed session 9. Oct 2 19:27:58.960127 kernel: audit: type=1104 audit(1696274878.934:1428): pid=4870 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:27:58.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.85:22-147.75.109.163:47270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:27:59.044399 kubelet[2109]: E1002 19:27:59.044298 2109 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:27:59.047534 env[1138]: time="2023-10-02T19:27:59.047439571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:27:59.212419 env[1138]: time="2023-10-02T19:27:59.212204766Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:59.214520 env[1138]: time="2023-10-02T19:27:59.214378334Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:59.214892 kubelet[2109]: E1002 19:27:59.214862 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:59.215033 kubelet[2109]: E1002 19:27:59.214940 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:27:59.215586 kubelet[2109]: E1002 19:27:59.215536 2109 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:59.216818 env[1138]: time="2023-10-02T19:27:59.216761811Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:27:59.348703 env[1138]: time="2023-10-02T19:27:59.348616924Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:27:59.354820 env[1138]: time="2023-10-02T19:27:59.354735574Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:27:59.357947 kubelet[2109]: E1002 19:27:59.357892 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:59.358306 kubelet[2109]: E1002 19:27:59.358286 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:27:59.358599 kubelet[2109]: E1002 19:27:59.358575 2109 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kcpbm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-n9mv2_calico-system(ab7e09b4-bb1a-4cbe-848e-4073bffc883d): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:27:59.358985 kubelet[2109]: E1002 19:27:59.358962 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:28:05.232430 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.oqWxEF.mount: Deactivated successfully. Oct 2 19:28:05.283800 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.WdORuG.mount: Deactivated successfully. Oct 2 19:28:06.225178 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.uzMrDL.mount: Deactivated successfully. Oct 2 19:28:07.036385 env[1138]: time="2023-10-02T19:28:07.036012255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:28:07.172649 env[1138]: time="2023-10-02T19:28:07.172563808Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:28:07.176100 env[1138]: time="2023-10-02T19:28:07.176006189Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:28:07.176359 kubelet[2109]: E1002 19:28:07.176315 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:28:07.176837 kubelet[2109]: E1002 19:28:07.176366 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:28:07.176837 kubelet[2109]: E1002 19:28:07.176510 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-mt2r4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-5hmhz_calico-apiserver(1ec74be6-cf04-4aff-806e-a149cf8c8889): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:28:07.176837 kubelet[2109]: E1002 19:28:07.176567 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:28:08.947941 systemd[1]: Started sshd@9-10.128.0.85:22-147.75.109.163:53894.service. Oct 2 19:28:08.983126 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:28:08.983265 kernel: audit: type=1130 audit(1696274888.950:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.85:22-147.75.109.163:53894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:08.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.85:22-147.75.109.163:53894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:09.038501 env[1138]: time="2023-10-02T19:28:09.038165520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:28:09.170534 env[1138]: time="2023-10-02T19:28:09.170452299Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:28:09.172479 env[1138]: time="2023-10-02T19:28:09.172407518Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:28:09.172841 kubelet[2109]: E1002 19:28:09.172813 2109 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:28:09.173417 kubelet[2109]: E1002 19:28:09.172867 2109 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:28:09.173417 kubelet[2109]: E1002 19:28:09.173024 2109 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-6qdgm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75975b5c9-cccn4_calico-apiserver(d0dbe630-c65f-4c1b-85d0-b1d83939186f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:28:09.173417 kubelet[2109]: E1002 19:28:09.173098 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:28:09.251000 audit[4950]: USER_ACCT pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.284169 kernel: audit: type=1101 audit(1696274889.251:1431): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.284309 sshd[4950]: Accepted publickey for core from 147.75.109.163 port 53894 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:28:09.283000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.285862 sshd[4950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:09.295919 systemd[1]: Started session-10.scope. Oct 2 19:28:09.297048 systemd-logind[1123]: New session 10 of user core. Oct 2 19:28:09.328473 kernel: audit: type=1103 audit(1696274889.283:1432): pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.328668 kernel: audit: type=1006 audit(1696274889.284:1433): pid=4950 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:28:09.284000 audit[4950]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee01a58a0 a2=3 a3=0 items=0 ppid=1 pid=4950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:09.329248 kernel: audit: type=1300 audit(1696274889.284:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee01a58a0 a2=3 a3=0 items=0 ppid=1 pid=4950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:09.284000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:09.367346 kernel: audit: type=1327 audit(1696274889.284:1433): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:09.367546 kernel: audit: type=1105 audit(1696274889.306:1434): pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.306000 audit[4950]: USER_START pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.311000 audit[4952]: CRED_ACQ pid=4952 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.401151 kernel: audit: type=1103 audit(1696274889.311:1435): pid=4952 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.628551 sshd[4950]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:09.630000 audit[4950]: USER_END pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.635608 systemd[1]: sshd@9-10.128.0.85:22-147.75.109.163:53894.service: Deactivated successfully. Oct 2 19:28:09.636847 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:28:09.639033 systemd-logind[1123]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:28:09.640676 systemd-logind[1123]: Removed session 10. Oct 2 19:28:09.630000 audit[4950]: CRED_DISP pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.689217 kernel: audit: type=1106 audit(1696274889.630:1436): pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.689420 kernel: audit: type=1104 audit(1696274889.630:1437): pid=4950 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:09.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.85:22-147.75.109.163:53894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:09.699282 systemd[1]: Started sshd@10-10.128.0.85:22-147.75.109.163:53898.service. Oct 2 19:28:09.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.85:22-147.75.109.163:53898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:09.998000 audit[4966]: USER_ACCT pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:10.000547 sshd[4966]: Accepted publickey for core from 147.75.109.163 port 53898 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:28:10.000000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:10.000000 audit[4966]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc427d80e0 a2=3 a3=0 items=0 ppid=1 pid=4966 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:10.000000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:10.001990 sshd[4966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:10.009640 systemd-logind[1123]: New session 11 of user core. Oct 2 19:28:10.010553 systemd[1]: Started session-11.scope. Oct 2 19:28:10.019000 audit[4966]: USER_START pid=4966 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:10.021000 audit[4969]: CRED_ACQ pid=4969 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.037510 kubelet[2109]: E1002 19:28:11.037468 2109 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-n9mv2" podUID=ab7e09b4-bb1a-4cbe-848e-4073bffc883d Oct 2 19:28:11.438176 sshd[4966]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:11.440000 audit[4966]: USER_END pid=4966 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.441000 audit[4966]: CRED_DISP pid=4966 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.445150 systemd-logind[1123]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:28:11.447645 systemd[1]: sshd@10-10.128.0.85:22-147.75.109.163:53898.service: Deactivated successfully. Oct 2 19:28:11.448950 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:28:11.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.85:22-147.75.109.163:53898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:11.451736 systemd-logind[1123]: Removed session 11. Oct 2 19:28:11.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.85:22-147.75.109.163:53910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:11.484986 systemd[1]: Started sshd@11-10.128.0.85:22-147.75.109.163:53910.service. Oct 2 19:28:11.784461 sshd[4978]: Accepted publickey for core from 147.75.109.163 port 53910 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:28:11.783000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.786000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.786000 audit[4978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea64d4720 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:11.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:11.788031 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:11.796134 systemd[1]: Started session-12.scope. Oct 2 19:28:11.797556 systemd-logind[1123]: New session 12 of user core. Oct 2 19:28:11.806000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:11.808000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:12.124203 sshd[4978]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:12.125000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:12.126000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:12.129305 systemd[1]: sshd@11-10.128.0.85:22-147.75.109.163:53910.service: Deactivated successfully. Oct 2 19:28:12.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.85:22-147.75.109.163:53910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:12.130594 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:28:12.131668 systemd-logind[1123]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:28:12.132911 systemd-logind[1123]: Removed session 12. Oct 2 19:28:15.234288 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.Vt4a2Z.mount: Deactivated successfully. Oct 2 19:28:15.280770 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.y9da9U.mount: Deactivated successfully. Oct 2 19:28:16.226241 systemd[1]: run-containerd-runc-k8s.io-a0600425c6e20e9a09a2e95ab02d19faa36896553cb2e6adbd1fe360934092bb-runc.i48wLF.mount: Deactivated successfully. Oct 2 19:28:21.034897 kubelet[2109]: E1002 19:28:21.034862 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-5hmhz" podUID=1ec74be6-cf04-4aff-806e-a149cf8c8889 Oct 2 19:28:22.036243 kubelet[2109]: E1002 19:28:22.036208 2109 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75975b5c9-cccn4" podUID=d0dbe630-c65f-4c1b-85d0-b1d83939186f Oct 2 19:28:22.172378 systemd[1]: Started sshd@12-10.128.0.85:22-147.75.109.163:60752.service. Oct 2 19:28:22.203930 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:28:22.204120 kernel: audit: type=1130 audit(1696274902.173:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.85:22-147.75.109.163:60752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:22.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.85:22-147.75.109.163:60752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:22.479000 audit[5067]: USER_ACCT pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.479646 sshd[5067]: Accepted publickey for core from 147.75.109.163 port 60752 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:28:22.509000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.510867 sshd[5067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:28:22.519505 systemd[1]: Started session-13.scope. Oct 2 19:28:22.521571 systemd-logind[1123]: New session 13 of user core. Oct 2 19:28:22.536159 kernel: audit: type=1101 audit(1696274902.479:1458): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.536312 kernel: audit: type=1103 audit(1696274902.509:1459): pid=5067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.539117 kernel: audit: type=1006 audit(1696274902.509:1460): pid=5067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:28:22.509000 audit[5067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8f07a4c0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:22.581394 kernel: audit: type=1300 audit(1696274902.509:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8f07a4c0 a2=3 a3=0 items=0 ppid=1 pid=5067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:28:22.581598 kernel: audit: type=1327 audit(1696274902.509:1460): proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:22.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:28:22.529000 audit[5067]: USER_START pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.592132 kernel: audit: type=1105 audit(1696274902.529:1461): pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.627169 kernel: audit: type=1103 audit(1696274902.534:1462): pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.534000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.848671 sshd[5067]: pam_unix(sshd:session): session closed for user core Oct 2 19:28:22.850000 audit[5067]: USER_END pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.876251 systemd[1]: sshd@12-10.128.0.85:22-147.75.109.163:60752.service: Deactivated successfully. Oct 2 19:28:22.877562 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:28:22.879633 systemd-logind[1123]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:28:22.881560 systemd-logind[1123]: Removed session 13. Oct 2 19:28:22.885121 kernel: audit: type=1106 audit(1696274902.850:1463): pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.885260 kernel: audit: type=1104 audit(1696274902.850:1464): pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.850000 audit[5067]: CRED_DISP pid=5067 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:28:22.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.85:22-147.75.109.163:60752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:28:25.233190 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.3lF9Vj.mount: Deactivated successfully. Oct 2 19:28:25.282515 systemd[1]: run-containerd-runc-k8s.io-45db11ace404148f261246096b6e28dab1b277ddeae78681bd2fbfc98f43694d-runc.zrGIzc.mount: Deactivated successfully.