Oct 2 19:08:08.108463 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:08:08.108573 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:08.108593 kernel: BIOS-provided physical RAM map: Oct 2 19:08:08.108606 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Oct 2 19:08:08.108619 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Oct 2 19:08:08.108631 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Oct 2 19:08:08.108651 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Oct 2 19:08:08.108665 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Oct 2 19:08:08.108678 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Oct 2 19:08:08.108691 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Oct 2 19:08:08.108705 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Oct 2 19:08:08.108718 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Oct 2 19:08:08.108731 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Oct 2 19:08:08.108744 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Oct 2 19:08:08.108764 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Oct 2 19:08:08.108778 kernel: NX (Execute Disable) protection: active Oct 2 19:08:08.108792 kernel: efi: EFI v2.70 by EDK II Oct 2 19:08:08.108806 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe386218 RNG=0xbfb73018 TPMEventLog=0xbe2c8018 Oct 2 19:08:08.108821 kernel: random: crng init done Oct 2 19:08:08.108835 kernel: SMBIOS 2.4 present. Oct 2 19:08:08.108850 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Oct 2 19:08:08.108864 kernel: Hypervisor detected: KVM Oct 2 19:08:08.108882 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:08:08.108896 kernel: kvm-clock: cpu 0, msr 13ef8a001, primary cpu clock Oct 2 19:08:08.108909 kernel: kvm-clock: using sched offset of 12648191606 cycles Oct 2 19:08:08.108925 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:08:08.108939 kernel: tsc: Detected 2299.998 MHz processor Oct 2 19:08:08.108955 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:08:08.108970 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:08:08.109000 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Oct 2 19:08:08.109015 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:08:08.109031 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Oct 2 19:08:08.109050 kernel: Using GB pages for direct mapping Oct 2 19:08:08.109065 kernel: Secure boot disabled Oct 2 19:08:08.109080 kernel: ACPI: Early table checksum verification disabled Oct 2 19:08:08.109095 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Oct 2 19:08:08.109111 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Oct 2 19:08:08.109126 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Oct 2 19:08:08.109141 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Oct 2 19:08:08.109156 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Oct 2 19:08:08.109183 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Oct 2 19:08:08.109199 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Oct 2 19:08:08.109216 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Oct 2 19:08:08.109232 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Oct 2 19:08:08.109249 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Oct 2 19:08:08.109265 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Oct 2 19:08:08.109285 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Oct 2 19:08:08.109300 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Oct 2 19:08:08.109315 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Oct 2 19:08:08.109330 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Oct 2 19:08:08.109345 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Oct 2 19:08:08.109360 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Oct 2 19:08:08.109375 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Oct 2 19:08:08.109390 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Oct 2 19:08:08.109406 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Oct 2 19:08:08.109424 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:08:08.109439 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:08:08.109454 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:08:08.109469 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Oct 2 19:08:08.109484 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Oct 2 19:08:08.109499 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Oct 2 19:08:08.109515 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Oct 2 19:08:08.109530 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Oct 2 19:08:08.109546 kernel: Zone ranges: Oct 2 19:08:08.109575 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:08:08.109591 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:08:08.109606 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:08:08.109622 kernel: Movable zone start for each node Oct 2 19:08:08.109637 kernel: Early memory node ranges Oct 2 19:08:08.109652 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Oct 2 19:08:08.109668 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Oct 2 19:08:08.109684 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Oct 2 19:08:08.109700 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Oct 2 19:08:08.109719 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:08:08.109735 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Oct 2 19:08:08.109750 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:08:08.109766 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Oct 2 19:08:08.109780 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Oct 2 19:08:08.109796 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Oct 2 19:08:08.109811 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Oct 2 19:08:08.109826 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:08:08.109842 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:08:08.109861 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:08:08.109877 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:08:08.109893 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:08:08.109909 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:08:08.109925 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:08:08.109942 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:08:08.109957 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:08:08.109987 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Oct 2 19:08:08.112150 kernel: Booting paravirtualized kernel on KVM Oct 2 19:08:08.112175 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:08:08.112330 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:08:08.112346 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:08:08.112362 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:08:08.112377 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:08:08.112393 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:08:08.112528 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:08:08.112544 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Oct 2 19:08:08.112560 kernel: Policy zone: Normal Oct 2 19:08:08.112590 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:08.112607 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:08:08.112746 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:08:08.112762 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:08:08.112779 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:08:08.112795 kernel: Memory: 7536584K/7860584K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 323740K reserved, 0K cma-reserved) Oct 2 19:08:08.112811 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:08:08.112904 kernel: Kernel/User page tables isolation: enabled Oct 2 19:08:08.112925 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:08:08.112941 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:08:08.112958 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:08:08.112990 kernel: rcu: RCU event tracing is enabled. Oct 2 19:08:08.113007 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:08:08.113023 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:08:08.113039 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:08:08.113056 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:08:08.113072 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:08:08.113092 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:08:08.113118 kernel: Console: colour dummy device 80x25 Oct 2 19:08:08.113134 kernel: printk: console [ttyS0] enabled Oct 2 19:08:08.113153 kernel: ACPI: Core revision 20210730 Oct 2 19:08:08.113169 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:08:08.113186 kernel: x2apic enabled Oct 2 19:08:08.113202 kernel: Switched APIC routing to physical x2apic. Oct 2 19:08:08.113218 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Oct 2 19:08:08.113235 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:08:08.113252 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Oct 2 19:08:08.113274 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Oct 2 19:08:08.113291 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Oct 2 19:08:08.113308 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:08:08.113324 kernel: Spectre V2 : Mitigation: IBRS Oct 2 19:08:08.113341 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:08:08.113358 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:08:08.113379 kernel: RETBleed: Mitigation: IBRS Oct 2 19:08:08.113396 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:08:08.113412 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Oct 2 19:08:08.113429 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:08:08.113445 kernel: MDS: Mitigation: Clear CPU buffers Oct 2 19:08:08.113461 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:08:08.113477 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:08:08.113494 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:08:08.113511 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:08:08.113532 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:08:08.113549 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:08:08.113575 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:08:08.113592 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:08:08.113608 kernel: LSM: Security Framework initializing Oct 2 19:08:08.113625 kernel: SELinux: Initializing. Oct 2 19:08:08.113641 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:08:08.113657 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:08:08.113675 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Oct 2 19:08:08.113696 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Oct 2 19:08:08.113713 kernel: signal: max sigframe size: 1776 Oct 2 19:08:08.113730 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:08:08.113745 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:08:08.113762 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:08:08.113779 kernel: x86: Booting SMP configuration: Oct 2 19:08:08.113796 kernel: .... node #0, CPUs: #1 Oct 2 19:08:08.113813 kernel: kvm-clock: cpu 1, msr 13ef8a041, secondary cpu clock Oct 2 19:08:08.113830 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:08:08.113851 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:08:08.113866 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:08:08.113882 kernel: smpboot: Max logical packages: 1 Oct 2 19:08:08.113898 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Oct 2 19:08:08.113916 kernel: devtmpfs: initialized Oct 2 19:08:08.113933 kernel: x86/mm: Memory block size: 128MB Oct 2 19:08:08.113950 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Oct 2 19:08:08.113967 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:08:08.113997 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:08:08.114018 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:08:08.114035 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:08:08.114052 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:08:08.114069 kernel: audit: type=2000 audit(1696273686.870:1): state=initialized audit_enabled=0 res=1 Oct 2 19:08:08.114086 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:08:08.114104 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:08:08.114122 kernel: cpuidle: using governor menu Oct 2 19:08:08.114140 kernel: ACPI: bus type PCI registered Oct 2 19:08:08.114157 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:08:08.114179 kernel: dca service started, version 1.12.1 Oct 2 19:08:08.114196 kernel: PCI: Using configuration type 1 for base access Oct 2 19:08:08.114214 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:08:08.114231 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:08:08.114246 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:08:08.114261 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:08:08.114278 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:08:08.114294 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:08:08.114310 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:08:08.114331 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:08:08.114349 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:08:08.114367 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:08:08.114384 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:08:08.114402 kernel: ACPI: Interpreter enabled Oct 2 19:08:08.114420 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:08:08.114436 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:08:08.114454 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:08:08.114470 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:08:08.114491 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:08:08.114720 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:08:08.114893 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:08:08.114916 kernel: PCI host bridge to bus 0000:00 Oct 2 19:08:08.119906 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:08:08.120095 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:08:08.120250 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:08:08.120392 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Oct 2 19:08:08.120532 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:08:08.120716 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:08:08.120890 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Oct 2 19:08:08.121318 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:08:08.121902 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:08:08.122173 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Oct 2 19:08:08.122342 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Oct 2 19:08:08.122508 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Oct 2 19:08:08.122694 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:08:08.122859 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Oct 2 19:08:08.129643 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Oct 2 19:08:08.129846 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:08:08.130030 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:08:08.130195 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Oct 2 19:08:08.130218 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:08:08.130236 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:08:08.130254 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:08:08.130271 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:08:08.130288 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:08:08.130311 kernel: iommu: Default domain type: Translated Oct 2 19:08:08.130329 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:08:08.130347 kernel: vgaarb: loaded Oct 2 19:08:08.130365 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:08:08.130383 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:08:08.130400 kernel: PTP clock support registered Oct 2 19:08:08.130418 kernel: Registered efivars operations Oct 2 19:08:08.130436 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:08:08.130454 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:08:08.130475 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Oct 2 19:08:08.130493 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Oct 2 19:08:08.130510 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Oct 2 19:08:08.130527 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Oct 2 19:08:08.130544 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:08:08.130568 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:08:08.130586 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:08:08.130604 kernel: pnp: PnP ACPI init Oct 2 19:08:08.130621 kernel: pnp: PnP ACPI: found 7 devices Oct 2 19:08:08.130643 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:08:08.130660 kernel: NET: Registered PF_INET protocol family Oct 2 19:08:08.130678 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:08:08.130696 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:08:08.130714 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:08:08.130732 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:08:08.130750 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:08:08.130767 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:08:08.130785 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:08:08.130805 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:08:08.130822 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:08:08.130840 kernel: NET: Registered PF_XDP protocol family Oct 2 19:08:08.131005 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:08:08.131154 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:08:08.131297 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:08:08.131441 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Oct 2 19:08:08.131615 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:08:08.131644 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:08:08.131662 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:08:08.131681 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Oct 2 19:08:08.131699 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:08:08.131717 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:08:08.131735 kernel: clocksource: Switched to clocksource tsc Oct 2 19:08:08.131753 kernel: Initialise system trusted keyrings Oct 2 19:08:08.131770 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:08:08.131791 kernel: Key type asymmetric registered Oct 2 19:08:08.131809 kernel: Asymmetric key parser 'x509' registered Oct 2 19:08:08.131826 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:08:08.131844 kernel: io scheduler mq-deadline registered Oct 2 19:08:08.131862 kernel: io scheduler kyber registered Oct 2 19:08:08.131878 kernel: io scheduler bfq registered Oct 2 19:08:08.131895 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:08:08.131914 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:08:08.132095 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Oct 2 19:08:08.132123 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:08:08.132283 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Oct 2 19:08:08.132306 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:08:08.132466 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Oct 2 19:08:08.132488 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:08:08.132506 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:08:08.132524 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:08:08.132541 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Oct 2 19:08:08.132559 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Oct 2 19:08:08.132740 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Oct 2 19:08:08.132765 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:08:08.132783 kernel: i8042: Warning: Keylock active Oct 2 19:08:08.132801 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:08:08.132819 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:08:08.133199 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:08:08.133649 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:08:08.134115 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:08:07 UTC (1696273687) Oct 2 19:08:08.134267 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:08:08.134287 kernel: intel_pstate: CPU model not supported Oct 2 19:08:08.134303 kernel: pstore: Registered efi as persistent store backend Oct 2 19:08:08.134320 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:08:08.134336 kernel: Segment Routing with IPv6 Oct 2 19:08:08.134352 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:08:08.134368 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:08:08.134384 kernel: Key type dns_resolver registered Oct 2 19:08:08.134405 kernel: IPI shorthand broadcast: enabled Oct 2 19:08:08.134421 kernel: sched_clock: Marking stable (795017705, 194426138)->(1079588394, -90144551) Oct 2 19:08:08.134437 kernel: registered taskstats version 1 Oct 2 19:08:08.134453 kernel: Loading compiled-in X.509 certificates Oct 2 19:08:08.134469 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:08:08.134485 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:08:08.134501 kernel: Key type .fscrypt registered Oct 2 19:08:08.134517 kernel: Key type fscrypt-provisioning registered Oct 2 19:08:08.134533 kernel: pstore: Using crash dump compression: deflate Oct 2 19:08:08.134552 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:08:08.134576 kernel: ima: No architecture policies found Oct 2 19:08:08.134592 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:08:08.134608 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:08:08.134624 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:08:08.134640 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:08:08.134656 kernel: Run /init as init process Oct 2 19:08:08.134672 kernel: with arguments: Oct 2 19:08:08.134691 kernel: /init Oct 2 19:08:08.134707 kernel: with environment: Oct 2 19:08:08.134722 kernel: HOME=/ Oct 2 19:08:08.134737 kernel: TERM=linux Oct 2 19:08:08.134753 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:08:08.134772 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:08.134792 systemd[1]: Detected virtualization kvm. Oct 2 19:08:08.134810 systemd[1]: Detected architecture x86-64. Oct 2 19:08:08.134829 systemd[1]: Running in initrd. Oct 2 19:08:08.134845 systemd[1]: No hostname configured, using default hostname. Oct 2 19:08:08.134862 systemd[1]: Hostname set to . Oct 2 19:08:08.134880 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:08.134898 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:08:08.134917 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:08.134935 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:08.134952 systemd[1]: Reached target paths.target. Oct 2 19:08:08.134983 systemd[1]: Reached target slices.target. Oct 2 19:08:08.134999 systemd[1]: Reached target swap.target. Oct 2 19:08:08.135016 systemd[1]: Reached target timers.target. Oct 2 19:08:08.135034 systemd[1]: Listening on iscsid.socket. Oct 2 19:08:08.135052 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:08:08.135068 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:08:08.135086 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:08:08.135109 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:08:08.135127 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:08.135145 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:08.135164 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:08.135182 systemd[1]: Reached target sockets.target. Oct 2 19:08:08.135200 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:08.135219 systemd[1]: Finished network-cleanup.service. Oct 2 19:08:08.135237 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:08:08.135256 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:08.135278 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:08.135296 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:08.135316 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:08:08.135350 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:08.135374 kernel: audit: type=1130 audit(1696273688.113:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.135393 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:08:08.135413 kernel: audit: type=1130 audit(1696273688.121:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.135436 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:08:08.135467 systemd-journald[190]: Journal started Oct 2 19:08:08.135553 systemd-journald[190]: Runtime Journal (/run/log/journal/f3f940525bc84a8fb8f3d9b11a8a6756) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:08:08.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.159049 systemd[1]: Started systemd-journald.service. Oct 2 19:08:08.159120 kernel: audit: type=1130 audit(1696273688.137:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.159149 kernel: audit: type=1130 audit(1696273688.147:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.137927 systemd-modules-load[191]: Inserted module 'overlay' Oct 2 19:08:08.150766 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:08:08.156219 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:08:08.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.175353 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:08:08.182033 kernel: audit: type=1130 audit(1696273688.173:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.200999 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:08:08.201147 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:08:08.206238 kernel: audit: type=1130 audit(1696273688.199:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.205520 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:08:08.211010 kernel: Bridge firewalling registered Oct 2 19:08:08.210585 systemd-resolved[192]: Positive Trust Anchors: Oct 2 19:08:08.210602 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:08.210666 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:08.211549 systemd-modules-load[191]: Inserted module 'br_netfilter' Oct 2 19:08:08.217576 systemd-resolved[192]: Defaulting to hostname 'linux'. Oct 2 19:08:08.230072 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:08:08.234078 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:08:08.244992 kernel: SCSI subsystem initialized Oct 2 19:08:08.254367 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:08.273494 kernel: audit: type=1130 audit(1696273688.256:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.273532 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:08:08.273554 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:08:08.273575 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:08:08.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.258220 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:08.274375 systemd-modules-load[191]: Inserted module 'dm_multipath' Oct 2 19:08:08.275408 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:08.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.281233 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:08.291093 kernel: audit: type=1130 audit(1696273688.278:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.294896 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:08.305106 kernel: audit: type=1130 audit(1696273688.297:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.337012 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:08:08.350013 kernel: iscsi: registered transport (tcp) Oct 2 19:08:08.374684 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:08:08.374766 kernel: QLogic iSCSI HBA Driver Oct 2 19:08:08.422549 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:08:08.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.427436 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:08:08.485034 kernel: raid6: avx2x4 gen() 18556 MB/s Oct 2 19:08:08.502022 kernel: raid6: avx2x4 xor() 8350 MB/s Oct 2 19:08:08.520026 kernel: raid6: avx2x2 gen() 18426 MB/s Oct 2 19:08:08.538018 kernel: raid6: avx2x2 xor() 18600 MB/s Oct 2 19:08:08.556022 kernel: raid6: avx2x1 gen() 14288 MB/s Oct 2 19:08:08.574018 kernel: raid6: avx2x1 xor() 16168 MB/s Oct 2 19:08:08.591016 kernel: raid6: sse2x4 gen() 11065 MB/s Oct 2 19:08:08.609015 kernel: raid6: sse2x4 xor() 6670 MB/s Oct 2 19:08:08.626016 kernel: raid6: sse2x2 gen() 12070 MB/s Oct 2 19:08:08.643016 kernel: raid6: sse2x2 xor() 7423 MB/s Oct 2 19:08:08.660014 kernel: raid6: sse2x1 gen() 10513 MB/s Oct 2 19:08:08.677810 kernel: raid6: sse2x1 xor() 5174 MB/s Oct 2 19:08:08.677853 kernel: raid6: using algorithm avx2x4 gen() 18556 MB/s Oct 2 19:08:08.677879 kernel: raid6: .... xor() 8350 MB/s, rmw enabled Oct 2 19:08:08.678547 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:08:08.694008 kernel: xor: automatically using best checksumming function avx Oct 2 19:08:08.799020 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:08:08.810382 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:08:08.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.812000 audit: BPF prog-id=7 op=LOAD Oct 2 19:08:08.812000 audit: BPF prog-id=8 op=LOAD Oct 2 19:08:08.815405 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:08.832522 systemd-udevd[388]: Using default interface naming scheme 'v252'. Oct 2 19:08:08.839837 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:08.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.842096 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:08:08.864913 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Oct 2 19:08:08.902121 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:08:08.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.904305 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:08.965722 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:08.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:09.034007 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:08:09.068463 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:08:09.068531 kernel: AES CTR mode by8 optimization enabled Oct 2 19:08:09.089112 kernel: scsi host0: Virtio SCSI HBA Oct 2 19:08:09.116027 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Oct 2 19:08:09.181781 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Oct 2 19:08:09.182113 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Oct 2 19:08:09.182318 kernel: sd 0:0:1:0: [sda] Write Protect is off Oct 2 19:08:09.183092 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Oct 2 19:08:09.183319 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:08:09.192386 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:08:09.192438 kernel: GPT:17805311 != 25165823 Oct 2 19:08:09.192461 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:08:09.193717 kernel: GPT:17805311 != 25165823 Oct 2 19:08:09.194449 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:08:09.196579 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:08:09.199002 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Oct 2 19:08:09.242004 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (438) Oct 2 19:08:09.243641 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:08:09.261451 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:08:09.271094 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:08:09.271356 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:08:09.287410 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:09.288992 systemd[1]: Starting disk-uuid.service... Oct 2 19:08:09.299958 disk-uuid[510]: Primary Header is updated. Oct 2 19:08:09.299958 disk-uuid[510]: Secondary Entries is updated. Oct 2 19:08:09.299958 disk-uuid[510]: Secondary Header is updated. Oct 2 19:08:09.311012 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:08:09.325016 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:08:09.340994 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:08:10.334054 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:08:10.334134 disk-uuid[511]: The operation has completed successfully. Oct 2 19:08:10.412535 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:08:10.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.412684 systemd[1]: Finished disk-uuid.service. Oct 2 19:08:10.424250 systemd[1]: Starting verity-setup.service... Oct 2 19:08:10.452997 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:08:10.534154 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:08:10.548387 systemd[1]: Finished verity-setup.service. Oct 2 19:08:10.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.562126 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:08:10.665930 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:08:10.665760 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:08:10.673387 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:08:10.716153 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:10.716192 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:08:10.716214 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:08:10.674312 systemd[1]: Starting ignition-setup.service... Oct 2 19:08:10.730241 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:08:10.681330 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:08:10.744081 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:08:10.757465 systemd[1]: Finished ignition-setup.service. Oct 2 19:08:10.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.758729 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:08:10.824751 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:08:10.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.832000 audit: BPF prog-id=9 op=LOAD Oct 2 19:08:10.835318 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:10.866534 systemd-networkd[685]: lo: Link UP Oct 2 19:08:10.866552 systemd-networkd[685]: lo: Gained carrier Oct 2 19:08:10.867345 systemd-networkd[685]: Enumeration completed Oct 2 19:08:10.867465 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:10.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.867872 systemd-networkd[685]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:10.870240 systemd-networkd[685]: eth0: Link UP Oct 2 19:08:10.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.870248 systemd-networkd[685]: eth0: Gained carrier Oct 2 19:08:10.883078 systemd-networkd[685]: eth0: DHCPv4 address 10.128.0.48/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:08:10.963281 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:10.963281 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:08:10.963281 iscsid[694]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:08:10.963281 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:08:10.963281 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:08:10.963281 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:08:10.963281 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:08:10.888659 systemd[1]: Reached target network.target. Oct 2 19:08:11.053153 ignition[620]: Ignition 2.14.0 Oct 2 19:08:11.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.911138 systemd[1]: Starting iscsiuio.service... Oct 2 19:08:11.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.053167 ignition[620]: Stage: fetch-offline Oct 2 19:08:10.919622 systemd[1]: Started iscsiuio.service. Oct 2 19:08:11.053239 ignition[620]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:10.931277 systemd[1]: Starting iscsid.service... Oct 2 19:08:11.053279 ignition[620]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:11.030423 systemd[1]: Started iscsid.service. Oct 2 19:08:11.073739 ignition[620]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:11.084584 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:08:11.073963 ignition[620]: parsed url from cmdline: "" Oct 2 19:08:11.099412 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:08:11.073969 ignition[620]: no config URL provided Oct 2 19:08:11.120257 systemd[1]: Starting ignition-fetch.service... Oct 2 19:08:11.073997 ignition[620]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:08:11.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.177398 unknown[704]: fetched base config from "system" Oct 2 19:08:11.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.074014 ignition[620]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:08:11.177411 unknown[704]: fetched base config from "system" Oct 2 19:08:11.074024 ignition[620]: failed to fetch config: resource requires networking Oct 2 19:08:11.177423 unknown[704]: fetched user config from "gcp" Oct 2 19:08:11.074370 ignition[620]: Ignition finished successfully Oct 2 19:08:11.189639 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:08:11.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.131897 ignition[704]: Ignition 2.14.0 Oct 2 19:08:11.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.204420 systemd[1]: Finished ignition-fetch.service. Oct 2 19:08:11.131906 ignition[704]: Stage: fetch Oct 2 19:08:11.222430 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:08:11.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.132052 ignition[704]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:11.231268 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:11.132082 ignition[704]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:11.245250 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:11.139934 ignition[704]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:11.260299 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:08:11.140163 ignition[704]: parsed url from cmdline: "" Oct 2 19:08:11.282089 systemd[1]: Starting ignition-kargs.service... Oct 2 19:08:11.140172 ignition[704]: no config URL provided Oct 2 19:08:11.296627 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:08:11.140179 ignition[704]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:08:11.311411 systemd[1]: Finished ignition-kargs.service. Oct 2 19:08:11.140190 ignition[704]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:08:11.327451 systemd[1]: Starting ignition-disks.service... Oct 2 19:08:11.140226 ignition[704]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Oct 2 19:08:11.348892 systemd[1]: Finished ignition-disks.service. Oct 2 19:08:11.148558 ignition[704]: GET result: OK Oct 2 19:08:11.361290 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:08:11.148675 ignition[704]: parsing config with SHA512: 6a5cc6c3bba8cfc69a95d7da3a400bf8d808778c122e753354f5b3cf83bddaeb7cb54fe1ef1db9b924ebf0a4d7f22677586f4488580704b1ec131e147c30f66b Oct 2 19:08:11.378127 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:11.178091 ignition[704]: fetch: fetch complete Oct 2 19:08:11.395144 systemd[1]: Reached target local-fs.target. Oct 2 19:08:11.178101 ignition[704]: fetch: fetch passed Oct 2 19:08:11.395261 systemd[1]: Reached target sysinit.target. Oct 2 19:08:11.178165 ignition[704]: Ignition finished successfully Oct 2 19:08:11.418166 systemd[1]: Reached target basic.target. Oct 2 19:08:11.294687 ignition[716]: Ignition 2.14.0 Oct 2 19:08:11.432433 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:08:11.294697 ignition[716]: Stage: kargs Oct 2 19:08:11.294812 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:11.294836 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:11.301110 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:11.302375 ignition[716]: kargs: kargs passed Oct 2 19:08:11.302422 ignition[716]: Ignition finished successfully Oct 2 19:08:11.338495 ignition[722]: Ignition 2.14.0 Oct 2 19:08:11.338504 ignition[722]: Stage: disks Oct 2 19:08:11.338630 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:11.338662 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:11.346216 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:11.347993 ignition[722]: disks: disks passed Oct 2 19:08:11.348052 ignition[722]: Ignition finished successfully Oct 2 19:08:11.466166 systemd-fsck[730]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:08:11.638886 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:08:11.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.654175 systemd[1]: Mounting sysroot.mount... Oct 2 19:08:11.678048 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:08:11.678987 systemd[1]: Mounted sysroot.mount. Oct 2 19:08:11.686296 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:08:11.782604 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:08:11.791732 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:08:11.791789 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:08:11.791821 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:08:11.892143 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (736) Oct 2 19:08:11.892184 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:11.892211 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:08:11.892237 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:08:11.892262 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:08:11.799517 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:08:11.828916 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:11.862073 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:08:11.926134 initrd-setup-root[743]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:08:11.898578 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:11.944097 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:08:11.954109 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:08:11.964101 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:08:11.966646 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:08:11.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.983136 systemd[1]: Starting ignition-mount.service... Oct 2 19:08:12.005004 systemd[1]: Starting sysroot-boot.service... Oct 2 19:08:12.013420 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:12.013670 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:08:12.041083 ignition[801]: INFO : Ignition 2.14.0 Oct 2 19:08:12.041083 ignition[801]: INFO : Stage: mount Oct 2 19:08:12.041083 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:12.041083 ignition[801]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:12.178439 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 2 19:08:12.178470 kernel: audit: type=1130 audit(1696273692.046:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:12.178488 kernel: audit: type=1130 audit(1696273692.084:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:12.178502 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (811) Oct 2 19:08:12.178516 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:08:12.178539 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:08:12.178553 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:08:12.178567 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:08:12.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:12.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:12.178741 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:12.178741 ignition[801]: INFO : mount: mount passed Oct 2 19:08:12.178741 ignition[801]: INFO : Ignition finished successfully Oct 2 19:08:12.046257 systemd[1]: Finished ignition-mount.service. Oct 2 19:08:12.050558 systemd[1]: Finished sysroot-boot.service. Oct 2 19:08:12.087639 systemd[1]: Starting ignition-files.service... Oct 2 19:08:12.239083 ignition[830]: INFO : Ignition 2.14.0 Oct 2 19:08:12.239083 ignition[830]: INFO : Stage: files Oct 2 19:08:12.239083 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:12.239083 ignition[830]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:12.239083 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:12.239083 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:08:12.314112 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (832) Oct 2 19:08:12.126235 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:08:12.323143 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:08:12.323143 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:08:12.323143 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:08:12.323143 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:08:12.323143 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4070748396" Oct 2 19:08:12.323143 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4070748396": device or resource busy Oct 2 19:08:12.323143 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4070748396", trying btrfs: device or resource busy Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4070748396" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4070748396" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem4070748396" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem4070748396" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:08:12.323143 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:08:12.206423 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:08:12.593089 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:08:12.251934 unknown[830]: wrote ssh authorized keys file for user: core Oct 2 19:08:12.433190 systemd-networkd[685]: eth0: Gained IPv6LL Oct 2 19:08:12.816420 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:08:12.840131 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:08:12.840131 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:08:12.840131 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:08:12.965562 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Oct 2 19:08:13.078798 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2223003065" Oct 2 19:08:13.102173 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2223003065": device or resource busy Oct 2 19:08:13.102173 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2223003065", trying btrfs: device or resource busy Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2223003065" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2223003065" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem2223003065" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2223003065" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:13.102173 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:08:13.321127 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Oct 2 19:08:13.634985 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:08:13.659152 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:08:13.659152 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:13.659152 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:08:13.718994 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Oct 2 19:08:14.626959 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:08:14.651179 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:08:14.651179 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:08:14.651179 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:08:14.707515 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Oct 2 19:08:15.053296 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705855103" Oct 2 19:08:15.077145 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705855103": device or resource busy Oct 2 19:08:15.077145 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2705855103", trying btrfs: device or resource busy Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705855103" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2705855103" Oct 2 19:08:15.077145 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2705855103" Oct 2 19:08:15.484302 kernel: audit: type=1130 audit(1696273695.127:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.484339 kernel: audit: type=1130 audit(1696273695.264:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.484356 kernel: audit: type=1130 audit(1696273695.310:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.484370 kernel: audit: type=1131 audit(1696273695.310:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.484384 kernel: audit: type=1130 audit(1696273695.420:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.484399 kernel: audit: type=1131 audit(1696273695.420:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.073436 systemd[1]: mnt-oem2705855103.mount: Deactivated successfully. Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2705855103" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem598473458" Oct 2 19:08:15.513155 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem598473458": device or resource busy Oct 2 19:08:15.513155 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem598473458", trying btrfs: device or resource busy Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem598473458" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem598473458" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem598473458" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem598473458" Oct 2 19:08:15.513155 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: op(1c): [started] processing unit "oem-gce.service" Oct 2 19:08:15.513155 ignition[830]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" Oct 2 19:08:15.885187 kernel: audit: type=1130 audit(1696273695.575:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.885240 kernel: audit: type=1131 audit(1696273695.715:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.107401 systemd[1]: mnt-oem598473458.mount: Deactivated successfully. Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1e): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(1e): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(20): [started] processing unit "prepare-critools.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(20): op(21): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(20): op(21): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(20): [finished] processing unit "prepare-critools.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(22): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(23): [started] setting preset to enabled for "oem-gce.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(23): [finished] setting preset to enabled for "oem-gce.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(24): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(24): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(25): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(25): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(26): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:15.901339 ignition[830]: INFO : files: op(26): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:08:16.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.116335 systemd[1]: Finished ignition-files.service. Oct 2 19:08:16.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.318238 ignition[830]: INFO : files: createResultFile: createFiles: op(27): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:16.318238 ignition[830]: INFO : files: createResultFile: createFiles: op(27): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:08:16.318238 ignition[830]: INFO : files: files passed Oct 2 19:08:16.318238 ignition[830]: INFO : Ignition finished successfully Oct 2 19:08:16.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.390255 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:08:15.139855 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:08:15.187308 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:08:15.188559 systemd[1]: Starting ignition-quench.service... Oct 2 19:08:15.224659 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:08:15.265795 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:08:16.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.265933 systemd[1]: Finished ignition-quench.service. Oct 2 19:08:16.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.311536 systemd[1]: Reached target ignition-complete.target. Oct 2 19:08:16.525170 ignition[868]: INFO : Ignition 2.14.0 Oct 2 19:08:16.525170 ignition[868]: INFO : Stage: umount Oct 2 19:08:16.525170 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:08:16.525170 ignition[868]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:08:16.525170 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:08:16.525170 ignition[868]: INFO : umount: umount passed Oct 2 19:08:16.525170 ignition[868]: INFO : Ignition finished successfully Oct 2 19:08:16.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.372432 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:08:16.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.653000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:08:15.419842 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:08:16.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.419959 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:08:15.422483 systemd[1]: Reached target initrd-fs.target. Oct 2 19:08:16.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.505393 systemd[1]: Reached target initrd.target. Oct 2 19:08:15.534414 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:08:15.535773 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:08:16.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.558540 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:08:16.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.577911 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:08:16.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.628239 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:08:15.641595 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:08:15.674518 systemd[1]: Stopped target timers.target. Oct 2 19:08:16.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.695573 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:08:16.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.695784 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:08:16.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:15.717754 systemd[1]: Stopped target initrd.target. Oct 2 19:08:15.779444 systemd[1]: Stopped target basic.target. Oct 2 19:08:15.793584 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:08:16.894042 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Oct 2 19:08:16.894274 iscsid[694]: iscsid shutting down. Oct 2 19:08:15.817586 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:08:15.856448 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:08:15.867589 systemd[1]: Stopped target remote-fs.target. Oct 2 19:08:15.893362 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:08:15.909362 systemd[1]: Stopped target sysinit.target. Oct 2 19:08:15.931397 systemd[1]: Stopped target local-fs.target. Oct 2 19:08:15.953458 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:08:15.974451 systemd[1]: Stopped target swap.target. Oct 2 19:08:15.992547 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:08:15.992753 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:08:16.016770 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:08:16.042314 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:08:16.042503 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:08:16.061448 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:08:16.061628 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:08:16.088448 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:08:16.088621 systemd[1]: Stopped ignition-files.service. Oct 2 19:08:16.106992 systemd[1]: Stopping ignition-mount.service... Oct 2 19:08:16.144130 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:08:16.144364 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:08:16.177432 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:08:16.195113 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:08:16.195368 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:08:16.209460 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:08:16.209620 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:08:16.233061 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:08:16.233933 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:08:16.234071 systemd[1]: Stopped ignition-mount.service. Oct 2 19:08:16.248707 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:08:16.248809 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:08:16.267727 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:08:16.267886 systemd[1]: Stopped ignition-disks.service. Oct 2 19:08:16.285366 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:08:16.285430 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:08:16.311283 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:08:16.311340 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:08:16.326274 systemd[1]: Stopped target network.target. Oct 2 19:08:16.341275 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:08:16.341345 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:08:16.362348 systemd[1]: Stopped target paths.target. Oct 2 19:08:16.376251 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:08:16.380069 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:08:16.398077 systemd[1]: Stopped target slices.target. Oct 2 19:08:16.417101 systemd[1]: Stopped target sockets.target. Oct 2 19:08:16.432171 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:08:16.432224 systemd[1]: Closed iscsid.socket. Oct 2 19:08:16.456190 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:08:16.456249 systemd[1]: Closed iscsiuio.socket. Oct 2 19:08:16.470168 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:08:16.470256 systemd[1]: Stopped ignition-setup.service. Oct 2 19:08:16.486211 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:08:16.486284 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:08:16.502430 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:08:16.506057 systemd-networkd[685]: eth0: DHCPv6 lease lost Oct 2 19:08:16.901000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:08:16.517362 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:08:16.532949 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:08:16.533094 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:08:16.540053 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:08:16.540179 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:08:16.552931 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:08:16.553057 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:08:16.570407 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:08:16.570453 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:08:16.595251 systemd[1]: Stopping network-cleanup.service... Oct 2 19:08:16.611301 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:08:16.611377 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:08:16.624418 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:08:16.624484 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:08:16.647385 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:08:16.647449 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:08:16.663458 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:08:16.679663 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:08:16.680530 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:08:16.680676 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:08:16.695026 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:08:16.695117 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:08:16.708169 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:08:16.708234 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:08:16.723137 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:08:16.723215 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:08:16.740208 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:08:16.740273 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:08:16.756212 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:08:16.756286 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:08:16.772207 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:08:16.794089 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:08:16.794184 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:08:16.808649 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:08:16.808761 systemd[1]: Stopped network-cleanup.service. Oct 2 19:08:16.823429 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:08:16.823532 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:08:16.839416 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:08:16.856207 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:08:16.870641 systemd[1]: Switching root. Oct 2 19:08:16.905531 systemd-journald[190]: Journal stopped Oct 2 19:08:21.678436 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:08:21.678571 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:08:21.678599 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:08:21.678622 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:08:21.678652 kernel: SELinux: policy capability open_perms=1 Oct 2 19:08:21.678675 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:08:21.678709 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:08:21.678732 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:08:21.678754 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:08:21.678777 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:08:21.678800 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:08:21.678824 kernel: kauditd_printk_skb: 32 callbacks suppressed Oct 2 19:08:21.678858 kernel: audit: type=1403 audit(1696273697.219:77): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:08:21.678890 systemd[1]: Successfully loaded SELinux policy in 117.573ms. Oct 2 19:08:21.678929 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.601ms. Oct 2 19:08:21.678960 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:08:21.679013 systemd[1]: Detected virtualization kvm. Oct 2 19:08:21.679040 systemd[1]: Detected architecture x86-64. Oct 2 19:08:21.679063 systemd[1]: Detected first boot. Oct 2 19:08:21.679087 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:08:21.679111 kernel: audit: type=1400 audit(1696273697.383:78): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:21.679135 kernel: audit: type=1400 audit(1696273697.383:79): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:21.679164 kernel: audit: type=1334 audit(1696273697.404:80): prog-id=10 op=LOAD Oct 2 19:08:21.679185 kernel: audit: type=1334 audit(1696273697.404:81): prog-id=10 op=UNLOAD Oct 2 19:08:21.679205 kernel: audit: type=1334 audit(1696273697.424:82): prog-id=11 op=LOAD Oct 2 19:08:21.679228 kernel: audit: type=1334 audit(1696273697.424:83): prog-id=11 op=UNLOAD Oct 2 19:08:21.679251 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:08:21.679275 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:21.679300 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:21.679327 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:21.679356 kernel: audit: type=1334 audit(1696273700.811:84): prog-id=12 op=LOAD Oct 2 19:08:21.679379 kernel: audit: type=1334 audit(1696273700.811:85): prog-id=3 op=UNLOAD Oct 2 19:08:21.679403 kernel: audit: type=1334 audit(1696273700.818:86): prog-id=13 op=LOAD Oct 2 19:08:21.679426 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:08:21.679457 systemd[1]: Stopped iscsiuio.service. Oct 2 19:08:21.679481 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:08:21.679505 systemd[1]: Stopped iscsid.service. Oct 2 19:08:21.679528 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:08:21.679566 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:08:21.679592 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:08:21.679622 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:08:21.679648 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:08:21.679672 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:08:21.679696 systemd[1]: Created slice system-getty.slice. Oct 2 19:08:21.679719 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:08:21.679743 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:08:21.679771 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:08:21.679799 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:08:21.679823 systemd[1]: Created slice user.slice. Oct 2 19:08:21.679846 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:08:21.679870 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:08:21.679893 systemd[1]: Set up automount boot.automount. Oct 2 19:08:21.679917 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:08:21.679942 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:08:21.679966 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:08:21.680022 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:08:21.680047 systemd[1]: Reached target integritysetup.target. Oct 2 19:08:21.680070 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:08:21.680092 systemd[1]: Reached target remote-fs.target. Oct 2 19:08:21.680113 systemd[1]: Reached target slices.target. Oct 2 19:08:21.680136 systemd[1]: Reached target swap.target. Oct 2 19:08:21.680159 systemd[1]: Reached target torcx.target. Oct 2 19:08:21.680182 systemd[1]: Reached target veritysetup.target. Oct 2 19:08:21.680205 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:08:21.680231 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:08:21.680253 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:08:21.680276 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:08:21.680298 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:08:21.680320 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:08:21.680343 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:08:21.680364 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:08:21.680386 systemd[1]: Mounting media.mount... Oct 2 19:08:21.680408 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:21.680441 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:08:21.680464 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:08:21.680489 systemd[1]: Mounting tmp.mount... Oct 2 19:08:21.680517 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:08:21.680541 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:08:21.680607 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:08:21.680632 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:08:21.680655 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:08:21.680677 systemd[1]: Starting modprobe@drm.service... Oct 2 19:08:21.680706 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:08:21.680729 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:08:21.680754 systemd[1]: Starting modprobe@loop.service... Oct 2 19:08:21.680777 kernel: fuse: init (API version 7.34) Oct 2 19:08:21.680804 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:08:21.680828 kernel: loop: module loaded Oct 2 19:08:21.680852 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:08:21.680877 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:08:21.680903 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:08:21.680932 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:08:21.680958 systemd[1]: Stopped systemd-journald.service. Oct 2 19:08:21.681010 systemd[1]: Starting systemd-journald.service... Oct 2 19:08:21.681036 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:08:21.681061 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:08:21.681171 systemd-journald[992]: Journal started Oct 2 19:08:21.681279 systemd-journald[992]: Runtime Journal (/run/log/journal/f3f940525bc84a8fb8f3d9b11a8a6756) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:08:17.219000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:08:17.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:17.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:08:17.404000 audit: BPF prog-id=10 op=LOAD Oct 2 19:08:17.404000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:08:17.424000 audit: BPF prog-id=11 op=LOAD Oct 2 19:08:17.424000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:08:20.811000 audit: BPF prog-id=12 op=LOAD Oct 2 19:08:20.811000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:08:20.818000 audit: BPF prog-id=13 op=LOAD Oct 2 19:08:20.832000 audit: BPF prog-id=14 op=LOAD Oct 2 19:08:20.832000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:08:20.832000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:08:20.834000 audit: BPF prog-id=15 op=LOAD Oct 2 19:08:20.834000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:08:20.834000 audit: BPF prog-id=16 op=LOAD Oct 2 19:08:20.834000 audit: BPF prog-id=17 op=LOAD Oct 2 19:08:20.834000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:08:20.834000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:08:20.835000 audit: BPF prog-id=18 op=LOAD Oct 2 19:08:20.835000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:08:20.835000 audit: BPF prog-id=19 op=LOAD Oct 2 19:08:20.835000 audit: BPF prog-id=20 op=LOAD Oct 2 19:08:20.835000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:08:20.835000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:08:20.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:20.850000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:08:20.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:20.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:20.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:20.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.629000 audit: BPF prog-id=21 op=LOAD Oct 2 19:08:21.629000 audit: BPF prog-id=22 op=LOAD Oct 2 19:08:21.629000 audit: BPF prog-id=23 op=LOAD Oct 2 19:08:21.629000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:08:21.629000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:08:21.675000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:08:21.675000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffac71bac0 a2=4000 a3=7fffac71bb5c items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.675000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:08:20.811366 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:08:17.614562 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:20.838269 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:08:17.615500 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:17.615553 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:17.615615 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:08:17.615638 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:08:17.615702 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:08:17.615730 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:08:17.616123 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:08:17.616199 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:08:17.616228 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:08:17.617444 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:08:17.617519 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:08:17.617559 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:08:17.617593 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:08:17.617628 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:08:17.617661 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:08:20.212098 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:20.212397 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:20.212549 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:20.212786 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:08:20.212841 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:08:20.212932 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2023-10-02T19:08:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:08:21.689015 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:08:21.703015 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:08:21.716997 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:08:21.723009 systemd[1]: Stopped verity-setup.service. Oct 2 19:08:21.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.742191 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:08:21.751028 systemd[1]: Started systemd-journald.service. Oct 2 19:08:21.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.759326 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:08:21.767284 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:08:21.774273 systemd[1]: Mounted media.mount. Oct 2 19:08:21.781220 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:08:21.789232 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:08:21.797186 systemd[1]: Mounted tmp.mount. Oct 2 19:08:21.804306 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:08:21.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.813385 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:08:21.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.822378 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:08:21.822574 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:08:21.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.831425 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:08:21.831623 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:08:21.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.840418 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:08:21.840611 systemd[1]: Finished modprobe@drm.service. Oct 2 19:08:21.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.849426 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:08:21.849619 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:08:21.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.859440 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:08:21.859632 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:08:21.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.868628 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:08:21.868854 systemd[1]: Finished modprobe@loop.service. Oct 2 19:08:21.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.877486 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:08:21.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.886477 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:08:21.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.895445 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:08:21.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.904467 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:08:21.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.913944 systemd[1]: Reached target network-pre.target. Oct 2 19:08:21.923717 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:08:21.933589 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:08:21.941118 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:08:21.943664 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:08:21.952436 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:08:21.962873 systemd-journald[992]: Time spent on flushing to /var/log/journal/f3f940525bc84a8fb8f3d9b11a8a6756 is 80.283ms for 1157 entries. Oct 2 19:08:21.962873 systemd-journald[992]: System Journal (/var/log/journal/f3f940525bc84a8fb8f3d9b11a8a6756) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:08:22.066082 systemd-journald[992]: Received client request to flush runtime journal. Oct 2 19:08:22.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:21.961120 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:08:21.962635 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:08:21.978152 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:08:21.979858 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:08:21.988689 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:08:22.068483 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:08:21.997544 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:08:22.008381 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:08:22.017235 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:08:22.025413 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:08:22.037503 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:08:22.046658 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:08:22.055808 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:08:22.067269 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:08:22.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.634965 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:08:22.670951 kernel: kauditd_printk_skb: 57 callbacks suppressed Oct 2 19:08:22.671093 kernel: audit: type=1130 audit(1696273702.641:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.646000 audit: BPF prog-id=24 op=LOAD Oct 2 19:08:22.672125 systemd[1]: Starting systemd-udevd.service... Oct 2 19:08:22.668000 audit: BPF prog-id=25 op=LOAD Oct 2 19:08:22.669000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:08:22.669000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:08:22.685519 kernel: audit: type=1334 audit(1696273702.646:143): prog-id=24 op=LOAD Oct 2 19:08:22.685617 kernel: audit: type=1334 audit(1696273702.668:144): prog-id=25 op=LOAD Oct 2 19:08:22.685649 kernel: audit: type=1334 audit(1696273702.669:145): prog-id=7 op=UNLOAD Oct 2 19:08:22.685680 kernel: audit: type=1334 audit(1696273702.669:146): prog-id=8 op=UNLOAD Oct 2 19:08:22.720865 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Oct 2 19:08:22.768208 systemd[1]: Started systemd-udevd.service. Oct 2 19:08:22.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.799000 kernel: audit: type=1130 audit(1696273702.774:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.802181 systemd[1]: Starting systemd-networkd.service... Oct 2 19:08:22.799000 audit: BPF prog-id=26 op=LOAD Oct 2 19:08:22.814017 kernel: audit: type=1334 audit(1696273702.799:148): prog-id=26 op=LOAD Oct 2 19:08:22.823000 audit: BPF prog-id=27 op=LOAD Oct 2 19:08:22.832999 kernel: audit: type=1334 audit(1696273702.823:149): prog-id=27 op=LOAD Oct 2 19:08:22.833813 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:08:22.831000 audit: BPF prog-id=28 op=LOAD Oct 2 19:08:22.843021 kernel: audit: type=1334 audit(1696273702.831:150): prog-id=28 op=LOAD Oct 2 19:08:22.831000 audit: BPF prog-id=29 op=LOAD Oct 2 19:08:22.854011 kernel: audit: type=1334 audit(1696273702.831:151): prog-id=29 op=LOAD Oct 2 19:08:22.889461 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:08:22.912787 systemd[1]: Started systemd-userdbd.service. Oct 2 19:08:22.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:22.997005 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:08:23.060312 systemd-networkd[1023]: lo: Link UP Oct 2 19:08:23.060325 systemd-networkd[1023]: lo: Gained carrier Oct 2 19:08:23.061039 systemd-networkd[1023]: Enumeration completed Oct 2 19:08:23.061182 systemd[1]: Started systemd-networkd.service. Oct 2 19:08:23.061559 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:08:23.063926 systemd-networkd[1023]: eth0: Link UP Oct 2 19:08:23.063944 systemd-networkd[1023]: eth0: Gained carrier Oct 2 19:08:23.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.092114 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:08:23.092227 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1035) Oct 2 19:08:23.084000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:08:23.103026 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:08:23.084000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5596765ded00 a1=32194 a2=7f1073b4abc5 a3=5 items=106 ppid=1010 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:23.084000 audit: CWD cwd="/" Oct 2 19:08:23.084000 audit: PATH item=0 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=1 name=(null) inode=14367 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=2 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=3 name=(null) inode=14368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=4 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=5 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=6 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=7 name=(null) inode=14370 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=8 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=9 name=(null) inode=14371 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=10 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=11 name=(null) inode=14372 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=12 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=13 name=(null) inode=14373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=14 name=(null) inode=14369 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=15 name=(null) inode=14374 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=16 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=17 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=18 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=19 name=(null) inode=14376 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=20 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=21 name=(null) inode=14377 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=22 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=23 name=(null) inode=14378 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=24 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=25 name=(null) inode=14379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=26 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=27 name=(null) inode=14380 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=28 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=29 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=30 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=31 name=(null) inode=14382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=32 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=33 name=(null) inode=14383 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=34 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=35 name=(null) inode=14384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=36 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=37 name=(null) inode=14385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=38 name=(null) inode=14381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=39 name=(null) inode=14386 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=40 name=(null) inode=14366 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=41 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=42 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=43 name=(null) inode=14388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=44 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=45 name=(null) inode=14389 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=46 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=47 name=(null) inode=14390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=48 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=49 name=(null) inode=14391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=50 name=(null) inode=14387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=51 name=(null) inode=14392 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=53 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=54 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=55 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=56 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=57 name=(null) inode=14395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=58 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=59 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=60 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=61 name=(null) inode=14397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=62 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=63 name=(null) inode=14398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=64 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=65 name=(null) inode=14399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=66 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=67 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=68 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=69 name=(null) inode=14401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=70 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=71 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=72 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=73 name=(null) inode=14403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=74 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=75 name=(null) inode=14404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=76 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=77 name=(null) inode=14405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=78 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=79 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=80 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=81 name=(null) inode=14407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=82 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=83 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=84 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=85 name=(null) inode=14409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=86 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=87 name=(null) inode=14410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=88 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=89 name=(null) inode=14411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=90 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=91 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=92 name=(null) inode=14408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=93 name=(null) inode=14413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=94 name=(null) inode=14393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=95 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=96 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=97 name=(null) inode=14415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=98 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=99 name=(null) inode=14416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=100 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=101 name=(null) inode=14417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=102 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=103 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=104 name=(null) inode=14414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PATH item=105 name=(null) inode=14419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:23.084000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:08:23.105279 systemd-networkd[1023]: eth0: DHCPv4 address 10.128.0.48/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:08:23.117095 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:08:23.132190 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Oct 2 19:08:23.170302 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:08:23.184075 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:08:23.197002 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:08:23.212004 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:08:23.227454 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:08:23.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.238578 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:08:23.269049 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:23.298315 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:08:23.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.307320 systemd[1]: Reached target cryptsetup.target. Oct 2 19:08:23.318555 systemd[1]: Starting lvm2-activation.service... Oct 2 19:08:23.324656 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:08:23.352280 systemd[1]: Finished lvm2-activation.service. Oct 2 19:08:23.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.361307 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:08:23.370116 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:08:23.370168 systemd[1]: Reached target local-fs.target. Oct 2 19:08:23.378153 systemd[1]: Reached target machines.target. Oct 2 19:08:23.387740 systemd[1]: Starting ldconfig.service... Oct 2 19:08:23.395998 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:08:23.396096 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:23.397822 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:08:23.406953 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:08:23.418754 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:08:23.419086 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:23.419185 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:08:23.420869 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:08:23.421588 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Oct 2 19:08:23.424346 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:08:23.451358 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:08:23.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.471222 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:08:23.484903 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:08:23.503195 systemd-tmpfiles[1054]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:08:23.569440 systemd-fsck[1059]: fsck.fat 4.2 (2021-01-31) Oct 2 19:08:23.569440 systemd-fsck[1059]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:08:23.574356 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:08:23.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.589957 systemd[1]: Mounting boot.mount... Oct 2 19:08:23.609924 systemd[1]: Mounted boot.mount. Oct 2 19:08:23.638899 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:08:23.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.748292 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:08:23.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.759170 systemd[1]: Starting audit-rules.service... Oct 2 19:08:23.767629 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:08:23.775830 systemd[1]: Starting oem-gce-enable-oslogin.service... Oct 2 19:08:23.786463 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:08:23.796000 audit: BPF prog-id=30 op=LOAD Oct 2 19:08:23.846414 systemd[1]: Starting systemd-resolved.service... Oct 2 19:08:23.853000 audit: BPF prog-id=31 op=LOAD Oct 2 19:08:23.857367 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:08:23.866739 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:08:23.875989 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:08:23.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.884783 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:08:23.928000 audit[1081]: SYSTEM_BOOT pid=1081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.938878 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:08:23.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.949133 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Oct 2 19:08:23.949403 systemd[1]: Finished oem-gce-enable-oslogin.service. Oct 2 19:08:23.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:23.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:24.027000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:08:24.027000 audit[1095]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef0e79440 a2=420 a3=0 items=0 ppid=1062 pid=1095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.027000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:08:24.030137 augenrules[1095]: No rules Oct 2 19:08:24.032411 systemd[1]: Finished audit-rules.service. Oct 2 19:08:24.042390 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:08:24.047156 systemd-timesyncd[1080]: Contacted time server 169.254.169.254:123 (169.254.169.254). Oct 2 19:08:24.047723 systemd-timesyncd[1080]: Initial clock synchronization to Mon 2023-10-02 19:08:24.194341 UTC. Oct 2 19:08:24.051698 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:08:24.061221 systemd[1]: Reached target time-set.target. Oct 2 19:08:24.124485 systemd-resolved[1076]: Positive Trust Anchors: Oct 2 19:08:24.124505 systemd-resolved[1076]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:08:24.124567 systemd-resolved[1076]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:08:24.165255 systemd-resolved[1076]: Defaulting to hostname 'linux'. Oct 2 19:08:24.167959 systemd[1]: Started systemd-resolved.service. Oct 2 19:08:24.176247 systemd[1]: Reached target network.target. Oct 2 19:08:24.185116 systemd[1]: Reached target nss-lookup.target. Oct 2 19:08:24.365169 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:08:24.473888 systemd[1]: Finished ldconfig.service. Oct 2 19:08:24.483039 systemd[1]: Starting systemd-update-done.service... Oct 2 19:08:24.492224 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:08:24.492921 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:08:24.501493 systemd[1]: Finished systemd-update-done.service. Oct 2 19:08:24.510302 systemd[1]: Reached target sysinit.target. Oct 2 19:08:24.519191 systemd[1]: Started motdgen.path. Oct 2 19:08:24.526139 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:08:24.536335 systemd[1]: Started logrotate.timer. Oct 2 19:08:24.543277 systemd[1]: Started mdadm.timer. Oct 2 19:08:24.550109 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:08:24.559107 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:08:24.559167 systemd[1]: Reached target paths.target. Oct 2 19:08:24.566092 systemd[1]: Reached target timers.target. Oct 2 19:08:24.573537 systemd[1]: Listening on dbus.socket. Oct 2 19:08:24.581439 systemd[1]: Starting docker.socket... Oct 2 19:08:24.591951 systemd[1]: Listening on sshd.socket. Oct 2 19:08:24.599229 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:24.599918 systemd[1]: Listening on docker.socket. Oct 2 19:08:24.607244 systemd[1]: Reached target sockets.target. Oct 2 19:08:24.616111 systemd[1]: Reached target basic.target. Oct 2 19:08:24.623160 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:24.623202 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:08:24.624691 systemd[1]: Starting containerd.service... Oct 2 19:08:24.633423 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:08:24.643780 systemd[1]: Starting dbus.service... Oct 2 19:08:24.651479 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:08:24.661870 systemd[1]: Starting extend-filesystems.service... Oct 2 19:08:24.667460 jq[1108]: false Oct 2 19:08:24.671064 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:08:24.672964 systemd[1]: Starting motdgen.service... Oct 2 19:08:24.681961 systemd[1]: Starting oem-gce.service... Oct 2 19:08:24.690849 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:08:24.700930 systemd[1]: Starting prepare-critools.service... Oct 2 19:08:24.709739 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:08:24.721282 systemd[1]: Starting sshd-keygen.service... Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda1 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda2 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda3 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found usr Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda4 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda6 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda7 Oct 2 19:08:24.733145 extend-filesystems[1109]: Found sda9 Oct 2 19:08:24.733145 extend-filesystems[1109]: Checking size of /dev/sda9 Oct 2 19:08:24.734289 systemd[1]: Starting systemd-logind.service... Oct 2 19:08:24.746011 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:08:24.746114 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Oct 2 19:08:24.859417 jq[1133]: true Oct 2 19:08:24.746827 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:08:24.747855 systemd[1]: Starting update-engine.service... Oct 2 19:08:24.861763 tar[1136]: ./ Oct 2 19:08:24.861763 tar[1136]: ./loopback Oct 2 19:08:24.756563 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:08:24.862434 tar[1137]: crictl Oct 2 19:08:24.767923 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:08:24.768235 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:08:24.863461 jq[1139]: true Oct 2 19:08:24.768732 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:08:24.863923 mkfs.ext4[1142]: mke2fs 1.46.5 (30-Dec-2021) Oct 2 19:08:24.863923 mkfs.ext4[1142]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Oct 2 19:08:24.863923 mkfs.ext4[1142]: Creating filesystem with 262144 4k blocks and 65536 inodes Oct 2 19:08:24.863923 mkfs.ext4[1142]: Filesystem UUID: 5556556d-1646-47b0-a088-4ab14ee80458 Oct 2 19:08:24.863923 mkfs.ext4[1142]: Superblock backups stored on blocks: Oct 2 19:08:24.863923 mkfs.ext4[1142]: 32768, 98304, 163840, 229376 Oct 2 19:08:24.863923 mkfs.ext4[1142]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:08:24.863923 mkfs.ext4[1142]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:08:24.768995 systemd[1]: Finished motdgen.service. Oct 2 19:08:24.869282 mkfs.ext4[1142]: Creating journal (8192 blocks): done Oct 2 19:08:24.780062 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:08:24.780362 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:08:24.883601 mkfs.ext4[1142]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:08:24.936109 update_engine[1130]: I1002 19:08:24.935783 1130 main.cc:92] Flatcar Update Engine starting Oct 2 19:08:24.945233 extend-filesystems[1109]: Resized partition /dev/sda9 Oct 2 19:08:24.953046 systemd[1]: Started dbus.service. Oct 2 19:08:24.952760 dbus-daemon[1107]: [system] SELinux support is enabled Oct 2 19:08:24.960392 umount[1169]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Oct 2 19:08:24.964514 bash[1163]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:24.971146 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:08:24.977221 systemd-networkd[1023]: eth0: Gained IPv6LL Oct 2 19:08:24.983631 extend-filesystems[1170]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:08:24.985529 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:08:24.985601 systemd[1]: Reached target system-config.target. Oct 2 19:08:24.996996 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:08:24.997846 dbus-daemon[1107]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1023 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:25.010443 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:08:25.011087 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Oct 2 19:08:25.010481 systemd[1]: Reached target user-config.target. Oct 2 19:08:25.014371 update_engine[1130]: I1002 19:08:25.014223 1130 update_check_scheduler.cc:74] Next update check in 7m42s Oct 2 19:08:25.022950 systemd[1]: Started update-engine.service. Oct 2 19:08:25.023393 dbus-daemon[1107]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:08:25.040027 systemd[1]: Created slice system-sshd.slice. Oct 2 19:08:25.067408 systemd[1]: Started locksmithd.service. Oct 2 19:08:25.075677 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Oct 2 19:08:25.108099 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:08:25.108201 extend-filesystems[1170]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 19:08:25.108201 extend-filesystems[1170]: old_desc_blocks = 1, new_desc_blocks = 2 Oct 2 19:08:25.108201 extend-filesystems[1170]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Oct 2 19:08:25.107060 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:08:25.160490 coreos-metadata[1106]: Oct 02 19:08:25.154 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Oct 2 19:08:25.160859 tar[1136]: ./bandwidth Oct 2 19:08:25.160924 env[1141]: time="2023-10-02T19:08:25.132486803Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:08:25.166260 extend-filesystems[1109]: Resized filesystem in /dev/sda9 Oct 2 19:08:25.114844 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.166 INFO Fetch failed with 404: resource not found Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.169 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.170 INFO Fetch successful Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.170 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.171 INFO Fetch failed with 404: resource not found Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.171 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.172 INFO Fetch failed with 404: resource not found Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.172 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Oct 2 19:08:25.176168 coreos-metadata[1106]: Oct 02 19:08:25.173 INFO Fetch successful Oct 2 19:08:25.115134 systemd[1]: Finished extend-filesystems.service. Oct 2 19:08:25.177193 unknown[1106]: wrote ssh authorized keys file for user: core Oct 2 19:08:25.204689 systemd-logind[1128]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:08:25.212116 systemd-logind[1128]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:08:25.212752 systemd-logind[1128]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:08:25.213034 systemd-logind[1128]: New seat seat0. Oct 2 19:08:25.222061 systemd[1]: Started systemd-logind.service. Oct 2 19:08:25.231051 update-ssh-keys[1182]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:08:25.232115 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:08:25.381396 env[1141]: time="2023-10-02T19:08:25.381336215Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:08:25.384207 env[1141]: time="2023-10-02T19:08:25.384171337Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.387200 env[1141]: time="2023-10-02T19:08:25.387152991Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:25.387344 env[1141]: time="2023-10-02T19:08:25.387321808Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.387737 env[1141]: time="2023-10-02T19:08:25.387706316Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:25.387879 env[1141]: time="2023-10-02T19:08:25.387858443Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.387980 env[1141]: time="2023-10-02T19:08:25.387959274Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:08:25.388085 env[1141]: time="2023-10-02T19:08:25.388065779Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.388263 env[1141]: time="2023-10-02T19:08:25.388243619Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.388657 env[1141]: time="2023-10-02T19:08:25.388632552Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:08:25.393294 env[1141]: time="2023-10-02T19:08:25.393255327Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:08:25.393439 env[1141]: time="2023-10-02T19:08:25.393417807Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:08:25.393594 env[1141]: time="2023-10-02T19:08:25.393572788Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:08:25.393687 env[1141]: time="2023-10-02T19:08:25.393669231Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:08:25.401510 env[1141]: time="2023-10-02T19:08:25.401477526Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:08:25.401669 env[1141]: time="2023-10-02T19:08:25.401647180Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:08:25.401767 env[1141]: time="2023-10-02T19:08:25.401748023Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:08:25.401896 env[1141]: time="2023-10-02T19:08:25.401876911Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402068 env[1141]: time="2023-10-02T19:08:25.402049428Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402168 env[1141]: time="2023-10-02T19:08:25.402149544Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402283 env[1141]: time="2023-10-02T19:08:25.402240600Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402392 env[1141]: time="2023-10-02T19:08:25.402373382Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402489 env[1141]: time="2023-10-02T19:08:25.402471025Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402591 env[1141]: time="2023-10-02T19:08:25.402571106Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402683 env[1141]: time="2023-10-02T19:08:25.402665425Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.402773 env[1141]: time="2023-10-02T19:08:25.402755073Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:08:25.402970 env[1141]: time="2023-10-02T19:08:25.402951933Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:08:25.403210 env[1141]: time="2023-10-02T19:08:25.403190085Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:08:25.403800 env[1141]: time="2023-10-02T19:08:25.403775525Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:08:25.403940 env[1141]: time="2023-10-02T19:08:25.403919272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404064 env[1141]: time="2023-10-02T19:08:25.404042763Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:08:25.404257 env[1141]: time="2023-10-02T19:08:25.404237559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404441 env[1141]: time="2023-10-02T19:08:25.404415964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404554 env[1141]: time="2023-10-02T19:08:25.404533630Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404651 env[1141]: time="2023-10-02T19:08:25.404631114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404754 env[1141]: time="2023-10-02T19:08:25.404734894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404855 env[1141]: time="2023-10-02T19:08:25.404836545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.404954 env[1141]: time="2023-10-02T19:08:25.404935515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.405101 env[1141]: time="2023-10-02T19:08:25.405079414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.405220 env[1141]: time="2023-10-02T19:08:25.405200714Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:08:25.405466 env[1141]: time="2023-10-02T19:08:25.405445558Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.405572 env[1141]: time="2023-10-02T19:08:25.405553074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.405681 env[1141]: time="2023-10-02T19:08:25.405662454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.405777 env[1141]: time="2023-10-02T19:08:25.405758154Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:08:25.405880 env[1141]: time="2023-10-02T19:08:25.405857049Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:08:25.405971 env[1141]: time="2023-10-02T19:08:25.405952484Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:08:25.406107 env[1141]: time="2023-10-02T19:08:25.406084849Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:08:25.406232 env[1141]: time="2023-10-02T19:08:25.406212971Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:08:25.406698 env[1141]: time="2023-10-02T19:08:25.406611899Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:08:25.411607 env[1141]: time="2023-10-02T19:08:25.406887467Z" level=info msg="Connect containerd service" Oct 2 19:08:25.411607 env[1141]: time="2023-10-02T19:08:25.406944284Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:08:25.414282 env[1141]: time="2023-10-02T19:08:25.414246044Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:25.414790 env[1141]: time="2023-10-02T19:08:25.414766669Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:08:25.418512 env[1141]: time="2023-10-02T19:08:25.416057628Z" level=info msg="Start subscribing containerd event" Oct 2 19:08:25.418672 env[1141]: time="2023-10-02T19:08:25.418647752Z" level=info msg="Start recovering state" Oct 2 19:08:25.418857 env[1141]: time="2023-10-02T19:08:25.418837916Z" level=info msg="Start event monitor" Oct 2 19:08:25.423267 env[1141]: time="2023-10-02T19:08:25.423240534Z" level=info msg="Start snapshots syncer" Oct 2 19:08:25.423406 env[1141]: time="2023-10-02T19:08:25.423377055Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:08:25.423505 env[1141]: time="2023-10-02T19:08:25.423488035Z" level=info msg="Start streaming server" Oct 2 19:08:25.423773 env[1141]: time="2023-10-02T19:08:25.423755107Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:08:25.426397 systemd[1]: Started containerd.service. Oct 2 19:08:25.427071 env[1141]: time="2023-10-02T19:08:25.427047474Z" level=info msg="containerd successfully booted in 0.322565s" Oct 2 19:08:25.440045 tar[1136]: ./ptp Oct 2 19:08:25.614211 dbus-daemon[1107]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:08:25.614405 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:08:25.615340 dbus-daemon[1107]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1179 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:08:25.627762 systemd[1]: Starting polkit.service... Oct 2 19:08:25.642886 tar[1136]: ./vlan Oct 2 19:08:25.710223 polkitd[1187]: Started polkitd version 121 Oct 2 19:08:25.736586 polkitd[1187]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:08:25.736667 polkitd[1187]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:08:25.745309 polkitd[1187]: Finished loading, compiling and executing 2 rules Oct 2 19:08:25.745929 dbus-daemon[1107]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:08:25.746183 systemd[1]: Started polkit.service. Oct 2 19:08:25.746667 polkitd[1187]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:08:25.777324 systemd-hostnamed[1179]: Hostname set to (transient) Oct 2 19:08:25.780350 systemd-resolved[1076]: System hostname changed to 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal'. Oct 2 19:08:25.810751 tar[1136]: ./host-device Oct 2 19:08:25.923430 tar[1136]: ./tuning Oct 2 19:08:26.029066 tar[1136]: ./vrf Oct 2 19:08:26.129670 tar[1136]: ./sbr Oct 2 19:08:26.231090 tar[1136]: ./tap Oct 2 19:08:26.349063 tar[1136]: ./dhcp Oct 2 19:08:26.607617 systemd[1]: Finished prepare-critools.service. Oct 2 19:08:26.653513 tar[1136]: ./static Oct 2 19:08:26.722489 tar[1136]: ./firewall Oct 2 19:08:26.791898 tar[1136]: ./macvlan Oct 2 19:08:26.866805 tar[1136]: ./dummy Oct 2 19:08:26.926803 tar[1136]: ./bridge Oct 2 19:08:26.999452 tar[1136]: ./ipvlan Oct 2 19:08:27.102060 tar[1136]: ./portmap Oct 2 19:08:27.196098 tar[1136]: ./host-local Oct 2 19:08:27.312522 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:08:28.315270 sshd_keygen[1146]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:08:28.356554 systemd[1]: Finished sshd-keygen.service. Oct 2 19:08:28.366650 systemd[1]: Starting issuegen.service... Oct 2 19:08:28.376164 systemd[1]: Started sshd@0-10.128.0.48:22-147.75.109.163:59202.service. Oct 2 19:08:28.387954 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:08:28.388224 systemd[1]: Finished issuegen.service. Oct 2 19:08:28.397721 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:08:28.415676 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:08:28.424952 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:08:28.427582 systemd[1]: Started getty@tty1.service. Oct 2 19:08:28.437946 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:08:28.446474 systemd[1]: Reached target getty.target. Oct 2 19:08:28.710011 sshd[1208]: Accepted publickey for core from 147.75.109.163 port 59202 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:28.712771 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:28.731534 systemd[1]: Created slice user-500.slice. Oct 2 19:08:28.740693 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:08:28.752435 systemd-logind[1128]: New session 1 of user core. Oct 2 19:08:28.759717 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:08:28.770711 systemd[1]: Starting user@500.service... Oct 2 19:08:28.792668 (systemd)[1218]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:28.954486 systemd[1218]: Queued start job for default target default.target. Oct 2 19:08:28.955649 systemd[1218]: Reached target paths.target. Oct 2 19:08:28.955677 systemd[1218]: Reached target sockets.target. Oct 2 19:08:28.955709 systemd[1218]: Reached target timers.target. Oct 2 19:08:28.955730 systemd[1218]: Reached target basic.target. Oct 2 19:08:28.955882 systemd[1]: Started user@500.service. Oct 2 19:08:28.957615 systemd[1218]: Reached target default.target. Oct 2 19:08:28.957683 systemd[1218]: Startup finished in 152ms. Oct 2 19:08:28.964468 systemd[1]: Started session-1.scope. Oct 2 19:08:29.195608 systemd[1]: Started sshd@1-10.128.0.48:22-147.75.109.163:36630.service. Oct 2 19:08:29.525066 sshd[1227]: Accepted publickey for core from 147.75.109.163 port 36630 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:29.526487 sshd[1227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:29.535842 systemd[1]: Started session-2.scope. Oct 2 19:08:29.537065 systemd-logind[1128]: New session 2 of user core. Oct 2 19:08:29.750140 sshd[1227]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:29.756460 systemd[1]: sshd@1-10.128.0.48:22-147.75.109.163:36630.service: Deactivated successfully. Oct 2 19:08:29.757584 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:08:29.760060 systemd-logind[1128]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:08:29.762072 systemd-logind[1128]: Removed session 2. Oct 2 19:08:29.795487 systemd[1]: Started sshd@2-10.128.0.48:22-147.75.109.163:36632.service. Oct 2 19:08:30.101031 sshd[1233]: Accepted publickey for core from 147.75.109.163 port 36632 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:30.101605 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:30.109286 systemd-logind[1128]: New session 3 of user core. Oct 2 19:08:30.109968 systemd[1]: Started session-3.scope. Oct 2 19:08:30.319715 sshd[1233]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:30.323687 systemd[1]: sshd@2-10.128.0.48:22-147.75.109.163:36632.service: Deactivated successfully. Oct 2 19:08:30.324777 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:08:30.325974 systemd-logind[1128]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:08:30.327166 systemd-logind[1128]: Removed session 3. Oct 2 19:08:30.968899 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Oct 2 19:08:32.996025 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:08:33.014370 systemd-nspawn[1239]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Oct 2 19:08:33.014370 systemd-nspawn[1239]: Press ^] three times within 1s to kill container. Oct 2 19:08:33.029026 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:08:33.053350 systemd[1]: tmp-unifiedOmtFlB.mount: Deactivated successfully. Oct 2 19:08:33.118409 systemd[1]: Started oem-gce.service. Oct 2 19:08:33.126696 systemd[1]: Reached target multi-user.target. Oct 2 19:08:33.137413 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:08:33.151749 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:08:33.152029 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:08:33.162361 systemd[1]: Startup finished in 1.095s (kernel) + 9.268s (initrd) + 16.072s (userspace) = 26.437s. Oct 2 19:08:33.195848 systemd-nspawn[1239]: + '[' -e /etc/default/instance_configs.cfg.template ']' Oct 2 19:08:33.195848 systemd-nspawn[1239]: + echo -e '[InstanceSetup]\nset_host_keys = false' Oct 2 19:08:33.196137 systemd-nspawn[1239]: + /usr/bin/google_instance_setup Oct 2 19:08:33.894270 instance-setup[1245]: INFO Running google_set_multiqueue. Oct 2 19:08:33.911647 instance-setup[1245]: INFO Set channels for eth0 to 2. Oct 2 19:08:33.915790 instance-setup[1245]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Oct 2 19:08:33.917369 instance-setup[1245]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Oct 2 19:08:33.917879 instance-setup[1245]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Oct 2 19:08:33.919724 instance-setup[1245]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Oct 2 19:08:33.920252 instance-setup[1245]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Oct 2 19:08:33.921618 instance-setup[1245]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Oct 2 19:08:33.922134 instance-setup[1245]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Oct 2 19:08:33.923647 instance-setup[1245]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Oct 2 19:08:33.936562 instance-setup[1245]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Oct 2 19:08:33.937049 instance-setup[1245]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Oct 2 19:08:33.983858 systemd-nspawn[1239]: + /usr/bin/google_metadata_script_runner --script-type startup Oct 2 19:08:34.330698 startup-script[1276]: INFO Starting startup scripts. Oct 2 19:08:34.345971 startup-script[1276]: INFO No startup scripts found in metadata. Oct 2 19:08:34.346186 startup-script[1276]: INFO Finished running startup scripts. Oct 2 19:08:34.386677 systemd-nspawn[1239]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Oct 2 19:08:34.386677 systemd-nspawn[1239]: + daemon_pids=() Oct 2 19:08:34.387425 systemd-nspawn[1239]: + for d in accounts clock_skew network Oct 2 19:08:34.387425 systemd-nspawn[1239]: + daemon_pids+=($!) Oct 2 19:08:34.387425 systemd-nspawn[1239]: + for d in accounts clock_skew network Oct 2 19:08:34.387425 systemd-nspawn[1239]: + daemon_pids+=($!) Oct 2 19:08:34.387425 systemd-nspawn[1239]: + for d in accounts clock_skew network Oct 2 19:08:34.387704 systemd-nspawn[1239]: + daemon_pids+=($!) Oct 2 19:08:34.387704 systemd-nspawn[1239]: + NOTIFY_SOCKET=/run/systemd/notify Oct 2 19:08:34.387846 systemd-nspawn[1239]: + /usr/bin/systemd-notify --ready Oct 2 19:08:34.388246 systemd-nspawn[1239]: + /usr/bin/google_clock_skew_daemon Oct 2 19:08:34.388553 systemd-nspawn[1239]: + /usr/bin/google_network_daemon Oct 2 19:08:34.388951 systemd-nspawn[1239]: + /usr/bin/google_accounts_daemon Oct 2 19:08:34.436785 systemd-nspawn[1239]: + wait -n 36 37 38 Oct 2 19:08:35.109195 google-networking[1281]: INFO Starting Google Networking daemon. Oct 2 19:08:35.123793 google-clock-skew[1280]: INFO Starting Google Clock Skew daemon. Oct 2 19:08:35.141079 google-clock-skew[1280]: INFO Clock drift token has changed: 0. Oct 2 19:08:35.145189 systemd-nspawn[1239]: hwclock: Cannot access the Hardware Clock via any known method. Oct 2 19:08:35.145524 systemd-nspawn[1239]: hwclock: Use the --verbose option to see the details of our search for an access method. Oct 2 19:08:35.146691 google-clock-skew[1280]: WARNING Failed to sync system time with hardware clock. Oct 2 19:08:35.155099 groupadd[1290]: group added to /etc/group: name=google-sudoers, GID=1000 Oct 2 19:08:35.160022 groupadd[1290]: group added to /etc/gshadow: name=google-sudoers Oct 2 19:08:35.164271 groupadd[1290]: new group: name=google-sudoers, GID=1000 Oct 2 19:08:35.177659 google-accounts[1279]: INFO Starting Google Accounts daemon. Oct 2 19:08:35.203490 google-accounts[1279]: WARNING OS Login not installed. Oct 2 19:08:35.204601 google-accounts[1279]: INFO Creating a new user account for 0. Oct 2 19:08:35.209644 systemd-nspawn[1239]: useradd: invalid user name '0': use --badname to ignore Oct 2 19:08:35.210418 google-accounts[1279]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Oct 2 19:08:40.417589 systemd[1]: Started sshd@3-10.128.0.48:22-147.75.109.163:46586.service. Oct 2 19:08:40.708478 sshd[1302]: Accepted publickey for core from 147.75.109.163 port 46586 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:40.710376 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:40.716046 systemd-logind[1128]: New session 4 of user core. Oct 2 19:08:40.717004 systemd[1]: Started session-4.scope. Oct 2 19:08:40.926272 sshd[1302]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:40.930145 systemd[1]: sshd@3-10.128.0.48:22-147.75.109.163:46586.service: Deactivated successfully. Oct 2 19:08:40.931180 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:08:40.932075 systemd-logind[1128]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:08:40.933451 systemd-logind[1128]: Removed session 4. Oct 2 19:08:40.973609 systemd[1]: Started sshd@4-10.128.0.48:22-147.75.109.163:46588.service. Oct 2 19:08:41.264649 sshd[1308]: Accepted publickey for core from 147.75.109.163 port 46588 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:41.266294 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:41.272696 systemd[1]: Started session-5.scope. Oct 2 19:08:41.273552 systemd-logind[1128]: New session 5 of user core. Oct 2 19:08:41.475285 sshd[1308]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:41.479213 systemd[1]: sshd@4-10.128.0.48:22-147.75.109.163:46588.service: Deactivated successfully. Oct 2 19:08:41.480305 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:08:41.481193 systemd-logind[1128]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:08:41.482441 systemd-logind[1128]: Removed session 5. Oct 2 19:08:41.520720 systemd[1]: Started sshd@5-10.128.0.48:22-147.75.109.163:46602.service. Oct 2 19:08:41.806527 sshd[1315]: Accepted publickey for core from 147.75.109.163 port 46602 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:41.808586 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:41.815126 systemd[1]: Started session-6.scope. Oct 2 19:08:41.815953 systemd-logind[1128]: New session 6 of user core. Oct 2 19:08:42.019450 sshd[1315]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:42.023529 systemd[1]: sshd@5-10.128.0.48:22-147.75.109.163:46602.service: Deactivated successfully. Oct 2 19:08:42.024637 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:08:42.025610 systemd-logind[1128]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:08:42.026840 systemd-logind[1128]: Removed session 6. Oct 2 19:08:42.065588 systemd[1]: Started sshd@6-10.128.0.48:22-147.75.109.163:46610.service. Oct 2 19:08:42.352584 sshd[1321]: Accepted publickey for core from 147.75.109.163 port 46610 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:42.354270 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:42.360710 systemd[1]: Started session-7.scope. Oct 2 19:08:42.361516 systemd-logind[1128]: New session 7 of user core. Oct 2 19:08:42.553510 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:08:42.553894 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:42.562249 dbus-daemon[1107]: \xd0-ɉ#V: received setenforce notice (enforcing=30014512) Oct 2 19:08:42.564394 sudo[1324]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:42.609037 sshd[1321]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:42.613629 systemd[1]: sshd@6-10.128.0.48:22-147.75.109.163:46610.service: Deactivated successfully. Oct 2 19:08:42.614822 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:08:42.615727 systemd-logind[1128]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:08:42.617253 systemd-logind[1128]: Removed session 7. Oct 2 19:08:42.655867 systemd[1]: Started sshd@7-10.128.0.48:22-147.75.109.163:55032.service. Oct 2 19:08:42.949248 sshd[1328]: Accepted publickey for core from 147.75.109.163 port 55032 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:42.950842 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:42.957088 systemd-logind[1128]: New session 8 of user core. Oct 2 19:08:42.957251 systemd[1]: Started session-8.scope. Oct 2 19:08:43.128888 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:08:43.129300 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:43.133427 sudo[1332]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:43.144832 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:08:43.145231 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:43.157410 systemd[1]: Stopping audit-rules.service... Oct 2 19:08:43.158000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:08:43.160085 auditctl[1335]: No rules Oct 2 19:08:43.165189 kernel: kauditd_printk_skb: 129 callbacks suppressed Oct 2 19:08:43.165285 kernel: audit: type=1305 audit(1696273723.158:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:08:43.161367 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:08:43.161604 systemd[1]: Stopped audit-rules.service. Oct 2 19:08:43.166142 systemd[1]: Starting audit-rules.service... Oct 2 19:08:43.158000 audit[1335]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa1e55dc0 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.201964 augenrules[1352]: No rules Oct 2 19:08:43.203994 systemd[1]: Finished audit-rules.service. Oct 2 19:08:43.209704 sudo[1331]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:43.216016 kernel: audit: type=1300 audit(1696273723.158:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa1e55dc0 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.216105 kernel: audit: type=1327 audit(1696273723.158:170): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:08:43.158000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:08:43.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.242580 kernel: audit: type=1131 audit(1696273723.160:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.242670 kernel: audit: type=1130 audit(1696273723.203:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.255646 sshd[1328]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:43.260790 systemd[1]: sshd@7-10.128.0.48:22-147.75.109.163:55032.service: Deactivated successfully. Oct 2 19:08:43.261870 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:08:43.263634 systemd-logind[1128]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:08:43.208000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.265357 systemd-logind[1128]: Removed session 8. Oct 2 19:08:43.289592 kernel: audit: type=1106 audit(1696273723.208:173): pid=1331 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.289719 kernel: audit: type=1104 audit(1696273723.208:174): pid=1331 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.208000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.300534 systemd[1]: Started sshd@8-10.128.0.48:22-147.75.109.163:55036.service. Oct 2 19:08:43.345440 kernel: audit: type=1106 audit(1696273723.252:175): pid=1328 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.252000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.252000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.346128 kernel: audit: type=1104 audit(1696273723.252:176): pid=1328 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.48:22-147.75.109.163:55032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.48:22-147.75.109.163:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.395018 kernel: audit: type=1131 audit(1696273723.257:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.48:22-147.75.109.163:55032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.604000 audit[1358]: USER_ACCT pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.606043 sshd[1358]: Accepted publickey for core from 147.75.109.163 port 55036 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:08:43.605000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.605000 audit[1358]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6d806b60 a2=3 a3=0 items=0 ppid=1 pid=1358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:08:43.608314 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:08:43.614741 systemd[1]: Started session-9.scope. Oct 2 19:08:43.615655 systemd-logind[1128]: New session 9 of user core. Oct 2 19:08:43.621000 audit[1358]: USER_START pid=1358 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.624000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:08:43.781000 audit[1361]: USER_ACCT pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.782958 sudo[1361]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:08:43.782000 audit[1361]: CRED_REFR pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:43.783416 sudo[1361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:08:43.784000 audit[1361]: USER_START pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:44.390941 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:08:44.399260 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:08:44.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:44.400093 systemd[1]: Reached target network-online.target. Oct 2 19:08:44.402327 systemd[1]: Starting docker.service... Oct 2 19:08:44.448894 env[1377]: time="2023-10-02T19:08:44.448807306Z" level=info msg="Starting up" Oct 2 19:08:44.450422 env[1377]: time="2023-10-02T19:08:44.450363745Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:08:44.450422 env[1377]: time="2023-10-02T19:08:44.450395113Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:08:44.450422 env[1377]: time="2023-10-02T19:08:44.450423362Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:08:44.450651 env[1377]: time="2023-10-02T19:08:44.450439066Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:08:44.452996 env[1377]: time="2023-10-02T19:08:44.452926810Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:08:44.452996 env[1377]: time="2023-10-02T19:08:44.452949806Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:08:44.453164 env[1377]: time="2023-10-02T19:08:44.452987083Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:08:44.453164 env[1377]: time="2023-10-02T19:08:44.453012301Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:08:44.460882 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3686109552-merged.mount: Deactivated successfully. Oct 2 19:08:44.522518 env[1377]: time="2023-10-02T19:08:44.522457869Z" level=info msg="Loading containers: start." Oct 2 19:08:44.593000 audit[1407]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.593000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdd3153120 a2=0 a3=7ffdd315310c items=0 ppid=1377 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:08:44.596000 audit[1409]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.596000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd3385d000 a2=0 a3=7ffd3385cfec items=0 ppid=1377 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:08:44.598000 audit[1411]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.598000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcb4b8f8d0 a2=0 a3=7ffcb4b8f8bc items=0 ppid=1377 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:08:44.601000 audit[1413]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.601000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa66d7b20 a2=0 a3=7fffa66d7b0c items=0 ppid=1377 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:08:44.605000 audit[1415]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.605000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcff61efe0 a2=0 a3=7ffcff61efcc items=0 ppid=1377 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:08:44.624000 audit[1420]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.624000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb0a3fa30 a2=0 a3=7ffdb0a3fa1c items=0 ppid=1377 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.624000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:08:44.635000 audit[1422]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.635000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6e179c70 a2=0 a3=7fff6e179c5c items=0 ppid=1377 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:08:44.638000 audit[1424]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.638000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffdd5973b0 a2=0 a3=7fffdd59739c items=0 ppid=1377 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:08:44.641000 audit[1426]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.641000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe5ba348d0 a2=0 a3=7ffe5ba348bc items=0 ppid=1377 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:08:44.656000 audit[1430]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.656000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5eed2100 a2=0 a3=7ffc5eed20ec items=0 ppid=1377 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:08:44.658000 audit[1431]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.658000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe82a01440 a2=0 a3=7ffe82a0142c items=0 ppid=1377 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:08:44.673005 kernel: Initializing XFRM netlink socket Oct 2 19:08:44.718948 env[1377]: time="2023-10-02T19:08:44.718884152Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:08:44.750000 audit[1439]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.750000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffde869cf50 a2=0 a3=7ffde869cf3c items=0 ppid=1377 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:08:44.762000 audit[1442]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.762000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff5f867000 a2=0 a3=7fff5f866fec items=0 ppid=1377 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:08:44.767000 audit[1445]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.767000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff60661470 a2=0 a3=7fff6066145c items=0 ppid=1377 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:08:44.770000 audit[1447]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.770000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa3c58a90 a2=0 a3=7fffa3c58a7c items=0 ppid=1377 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:08:44.773000 audit[1449]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.773000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd58f418f0 a2=0 a3=7ffd58f418dc items=0 ppid=1377 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:08:44.776000 audit[1451]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.776000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff7ac3d310 a2=0 a3=7fff7ac3d2fc items=0 ppid=1377 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:08:44.779000 audit[1453]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.779000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffff74ed290 a2=0 a3=7ffff74ed27c items=0 ppid=1377 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:08:44.791000 audit[1456]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.791000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdd24c4530 a2=0 a3=7ffdd24c451c items=0 ppid=1377 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:08:44.794000 audit[1458]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.794000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff04e67e30 a2=0 a3=7fff04e67e1c items=0 ppid=1377 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:08:44.797000 audit[1460]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.797000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe17646f10 a2=0 a3=7ffe17646efc items=0 ppid=1377 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:08:44.800000 audit[1462]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.800000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd848a9b40 a2=0 a3=7ffd848a9b2c items=0 ppid=1377 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:08:44.802185 systemd-networkd[1023]: docker0: Link UP Oct 2 19:08:44.816000 audit[1466]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.816000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd44594830 a2=0 a3=7ffd4459481c items=0 ppid=1377 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:08:44.818000 audit[1467]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:44.818000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd9ffb55c0 a2=0 a3=7ffd9ffb55ac items=0 ppid=1377 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:08:44.819914 env[1377]: time="2023-10-02T19:08:44.819864044Z" level=info msg="Loading containers: done." Oct 2 19:08:44.834535 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1392026796-merged.mount: Deactivated successfully. Oct 2 19:08:44.848098 env[1377]: time="2023-10-02T19:08:44.848036632Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:08:44.848365 env[1377]: time="2023-10-02T19:08:44.848334095Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:08:44.848499 env[1377]: time="2023-10-02T19:08:44.848472760Z" level=info msg="Daemon has completed initialization" Oct 2 19:08:44.869612 systemd[1]: Started docker.service. Oct 2 19:08:44.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:44.884903 env[1377]: time="2023-10-02T19:08:44.884829450Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:08:44.908701 systemd[1]: Reloading. Oct 2 19:08:45.001001 /usr/lib/systemd/system-generators/torcx-generator[1515]: time="2023-10-02T19:08:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:45.002964 /usr/lib/systemd/system-generators/torcx-generator[1515]: time="2023-10-02T19:08:45Z" level=info msg="torcx already run" Oct 2 19:08:45.113408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:45.113437 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:45.137101 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.228000 audit: BPF prog-id=40 op=LOAD Oct 2 19:08:45.228000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit: BPF prog-id=41 op=LOAD Oct 2 19:08:45.230000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.230000 audit: BPF prog-id=42 op=LOAD Oct 2 19:08:45.230000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit: BPF prog-id=43 op=LOAD Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.231000 audit: BPF prog-id=44 op=LOAD Oct 2 19:08:45.231000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:08:45.231000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.232000 audit: BPF prog-id=45 op=LOAD Oct 2 19:08:45.232000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit: BPF prog-id=46 op=LOAD Oct 2 19:08:45.233000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit: BPF prog-id=47 op=LOAD Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.234000 audit: BPF prog-id=48 op=LOAD Oct 2 19:08:45.234000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:08:45.234000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit: BPF prog-id=49 op=LOAD Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.254000 audit: BPF prog-id=50 op=LOAD Oct 2 19:08:45.254000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:08:45.254000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.255000 audit: BPF prog-id=51 op=LOAD Oct 2 19:08:45.255000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit: BPF prog-id=52 op=LOAD Oct 2 19:08:45.257000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit: BPF prog-id=53 op=LOAD Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.257000 audit: BPF prog-id=54 op=LOAD Oct 2 19:08:45.257000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:08:45.257000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.259000 audit: BPF prog-id=55 op=LOAD Oct 2 19:08:45.259000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit: BPF prog-id=56 op=LOAD Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.260000 audit: BPF prog-id=57 op=LOAD Oct 2 19:08:45.260000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:08:45.260000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:08:45.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:45.277465 systemd[1]: Started kubelet.service. Oct 2 19:08:45.368059 kubelet[1558]: E1002 19:08:45.367964 1558 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:08:45.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:08:45.373801 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:08:45.374032 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:08:45.943467 env[1141]: time="2023-10-02T19:08:45.943399792Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 19:08:46.395395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4044235976.mount: Deactivated successfully. Oct 2 19:08:48.548609 env[1141]: time="2023-10-02T19:08:48.548517022Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.551540 env[1141]: time="2023-10-02T19:08:48.551464575Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.554714 env[1141]: time="2023-10-02T19:08:48.554645935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.558956 env[1141]: time="2023-10-02T19:08:48.558885881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.559561 env[1141]: time="2023-10-02T19:08:48.559515567Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 19:08:48.576779 env[1141]: time="2023-10-02T19:08:48.576695960Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 19:08:50.485551 env[1141]: time="2023-10-02T19:08:50.485472077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:50.488466 env[1141]: time="2023-10-02T19:08:50.488417117Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:50.490842 env[1141]: time="2023-10-02T19:08:50.490803394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:50.493085 env[1141]: time="2023-10-02T19:08:50.493035139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:50.494011 env[1141]: time="2023-10-02T19:08:50.493939753Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 19:08:50.509258 env[1141]: time="2023-10-02T19:08:50.509197481Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 19:08:51.845306 env[1141]: time="2023-10-02T19:08:51.845223857Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:51.848092 env[1141]: time="2023-10-02T19:08:51.848042063Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:51.850607 env[1141]: time="2023-10-02T19:08:51.850563978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:51.853045 env[1141]: time="2023-10-02T19:08:51.853005258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:51.853960 env[1141]: time="2023-10-02T19:08:51.853906488Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 19:08:51.867904 env[1141]: time="2023-10-02T19:08:51.867861170Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:08:52.959307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2645912268.mount: Deactivated successfully. Oct 2 19:08:53.609934 env[1141]: time="2023-10-02T19:08:53.609864504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.612724 env[1141]: time="2023-10-02T19:08:53.612678092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.615380 env[1141]: time="2023-10-02T19:08:53.615339662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.617913 env[1141]: time="2023-10-02T19:08:53.617872919Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.618655 env[1141]: time="2023-10-02T19:08:53.618602054Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:08:53.633274 env[1141]: time="2023-10-02T19:08:53.633231610Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:08:53.974060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4276791979.mount: Deactivated successfully. Oct 2 19:08:53.982868 env[1141]: time="2023-10-02T19:08:53.982807182Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.985479 env[1141]: time="2023-10-02T19:08:53.985435863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.987886 env[1141]: time="2023-10-02T19:08:53.987849527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.989952 env[1141]: time="2023-10-02T19:08:53.989917325Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:53.990694 env[1141]: time="2023-10-02T19:08:53.990640370Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:08:54.006089 env[1141]: time="2023-10-02T19:08:54.006002388Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 19:08:54.885905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount600582223.mount: Deactivated successfully. Oct 2 19:08:55.521234 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:08:55.548045 kernel: kauditd_printk_skb: 293 callbacks suppressed Oct 2 19:08:55.548197 kernel: audit: type=1130 audit(1696273735.520:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.521538 systemd[1]: Stopped kubelet.service. Oct 2 19:08:55.524102 systemd[1]: Started kubelet.service. Oct 2 19:08:55.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.592463 kernel: audit: type=1131 audit(1696273735.520:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.592621 kernel: audit: type=1130 audit(1696273735.523:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.607844 kubelet[1601]: E1002 19:08:55.607767 1601 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:08:55.612317 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:08:55.612540 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:08:55.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:08:55.635054 kernel: audit: type=1131 audit(1696273735.611:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:08:55.836369 kernel: audit: type=1131 audit(1696273735.811:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:55.811863 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:08:55.850000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:08:55.850000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:08:55.865713 kernel: audit: type=1334 audit(1696273735.850:426): prog-id=44 op=UNLOAD Oct 2 19:08:55.865800 kernel: audit: type=1334 audit(1696273735.850:427): prog-id=43 op=UNLOAD Oct 2 19:08:55.865838 kernel: audit: type=1334 audit(1696273735.850:428): prog-id=42 op=UNLOAD Oct 2 19:08:55.850000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:08:59.351593 env[1141]: time="2023-10-02T19:08:59.351517782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:59.354305 env[1141]: time="2023-10-02T19:08:59.354260827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:59.356609 env[1141]: time="2023-10-02T19:08:59.356565086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:59.358903 env[1141]: time="2023-10-02T19:08:59.358864607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:59.359725 env[1141]: time="2023-10-02T19:08:59.359667709Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 19:08:59.374608 env[1141]: time="2023-10-02T19:08:59.374559421Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:08:59.753470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3711364934.mount: Deactivated successfully. Oct 2 19:09:00.569923 env[1141]: time="2023-10-02T19:09:00.569852077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:00.572649 env[1141]: time="2023-10-02T19:09:00.572600148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:00.574760 env[1141]: time="2023-10-02T19:09:00.574717306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:00.576842 env[1141]: time="2023-10-02T19:09:00.576806886Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:00.577532 env[1141]: time="2023-10-02T19:09:00.577480798Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:09:00.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.48:22-205.210.31.209:55771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:00.731845 systemd[1]: Started sshd@9-10.128.0.48:22-205.210.31.209:55771.service. Oct 2 19:09:00.758038 kernel: audit: type=1130 audit(1696273740.731:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.48:22-205.210.31.209:55771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:00.955260 sshd[1621]: kex_exchange_identification: Connection closed by remote host Oct 2 19:09:00.955260 sshd[1621]: Connection closed by 205.210.31.209 port 55771 Oct 2 19:09:00.956276 systemd[1]: sshd@9-10.128.0.48:22-205.210.31.209:55771.service: Deactivated successfully. Oct 2 19:09:00.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.48:22-205.210.31.209:55771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:00.982009 kernel: audit: type=1131 audit(1696273740.955:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.48:22-205.210.31.209:55771 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.263764 systemd[1]: Stopped kubelet.service. Oct 2 19:09:04.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.295195 systemd[1]: Reloading. Oct 2 19:09:04.306886 kernel: audit: type=1130 audit(1696273744.263:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.307029 kernel: audit: type=1131 audit(1696273744.265:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.377840 /usr/lib/systemd/system-generators/torcx-generator[1701]: time="2023-10-02T19:09:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:09:04.384089 /usr/lib/systemd/system-generators/torcx-generator[1701]: time="2023-10-02T19:09:04Z" level=info msg="torcx already run" Oct 2 19:09:04.495690 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:09:04.495717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:09:04.519267 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.628996 kernel: audit: type=1400 audit(1696273744.606:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.659610 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:04.659760 kernel: audit: type=1400 audit(1696273744.606:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.659832 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:04.659867 kernel: audit: backlog limit exceeded Oct 2 19:09:04.659907 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.627000 audit: BPF prog-id=58 op=LOAD Oct 2 19:09:04.627000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.629000 audit: BPF prog-id=59 op=LOAD Oct 2 19:09:04.629000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit: BPF prog-id=60 op=LOAD Oct 2 19:09:04.631000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit: BPF prog-id=61 op=LOAD Oct 2 19:09:04.632000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit: BPF prog-id=62 op=LOAD Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.638000 audit: BPF prog-id=63 op=LOAD Oct 2 19:09:04.675000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:09:04.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit: BPF prog-id=64 op=LOAD Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.678000 audit: BPF prog-id=65 op=LOAD Oct 2 19:09:04.678000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:09:04.678000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.679000 audit: BPF prog-id=66 op=LOAD Oct 2 19:09:04.679000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.680000 audit: BPF prog-id=67 op=LOAD Oct 2 19:09:04.680000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit: BPF prog-id=68 op=LOAD Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.681000 audit: BPF prog-id=69 op=LOAD Oct 2 19:09:04.681000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:09:04.681000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit: BPF prog-id=70 op=LOAD Oct 2 19:09:04.683000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit: BPF prog-id=71 op=LOAD Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.684000 audit: BPF prog-id=72 op=LOAD Oct 2 19:09:04.684000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:09:04.684000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:09:04.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.707463 systemd[1]: Started kubelet.service. Oct 2 19:09:04.783372 kubelet[1744]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:04.783372 kubelet[1744]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:09:04.783372 kubelet[1744]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:04.783943 kubelet[1744]: I1002 19:09:04.783438 1744 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:09:05.596466 kubelet[1744]: I1002 19:09:05.596410 1744 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:09:05.596466 kubelet[1744]: I1002 19:09:05.596448 1744 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:09:05.596793 kubelet[1744]: I1002 19:09:05.596754 1744 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:09:05.602023 kubelet[1744]: E1002 19:09:05.601969 1744 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.48:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.602267 kubelet[1744]: I1002 19:09:05.602246 1744 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:09:05.606259 kubelet[1744]: I1002 19:09:05.606224 1744 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:09:05.606585 kubelet[1744]: I1002 19:09:05.606542 1744 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:09:05.606684 kubelet[1744]: I1002 19:09:05.606645 1744 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:09:05.606684 kubelet[1744]: I1002 19:09:05.606675 1744 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:09:05.606920 kubelet[1744]: I1002 19:09:05.606694 1744 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:09:05.606920 kubelet[1744]: I1002 19:09:05.606816 1744 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:05.610808 kubelet[1744]: I1002 19:09:05.610782 1744 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:09:05.610808 kubelet[1744]: I1002 19:09:05.610811 1744 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:09:05.611013 kubelet[1744]: I1002 19:09:05.610837 1744 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:09:05.611013 kubelet[1744]: I1002 19:09:05.610858 1744 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:09:05.617310 kubelet[1744]: W1002 19:09:05.617145 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.617310 kubelet[1744]: E1002 19:09:05.617224 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.617702 kubelet[1744]: W1002 19:09:05.617639 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.617702 kubelet[1744]: E1002 19:09:05.617691 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.617854 kubelet[1744]: I1002 19:09:05.617781 1744 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:09:05.620525 kubelet[1744]: W1002 19:09:05.620503 1744 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:09:05.621147 kubelet[1744]: I1002 19:09:05.621117 1744 server.go:1168] "Started kubelet" Oct 2 19:09:05.621443 kubelet[1744]: I1002 19:09:05.621425 1744 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:09:05.621844 kubelet[1744]: E1002 19:09:05.621719 1744 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal.178a5ffc0190f9f9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", UID:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 621088761, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 621088761, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.48:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.48:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:09:05.622838 kubelet[1744]: E1002 19:09:05.622496 1744 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:09:05.622838 kubelet[1744]: E1002 19:09:05.622526 1744 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:09:05.623522 kubelet[1744]: I1002 19:09:05.623501 1744 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:09:05.623000 audit[1744]: AVC avc: denied { mac_admin } for pid=1744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.623000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.623000 audit[1744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ceeb40 a1=c0006db278 a2=c000ceeb10 a3=25 items=0 ppid=1 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.623000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.624724 kubelet[1744]: I1002 19:09:05.624705 1744 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:09:05.623000 audit[1744]: AVC avc: denied { mac_admin } for pid=1744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.623000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.623000 audit[1744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d5e060 a1=c0006db290 a2=c000ceebd0 a3=25 items=0 ppid=1 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.623000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.625209 kubelet[1744]: I1002 19:09:05.621427 1744 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:09:05.625314 kubelet[1744]: I1002 19:09:05.625296 1744 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:09:05.625502 kubelet[1744]: I1002 19:09:05.625480 1744 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:09:05.629510 kubelet[1744]: E1002 19:09:05.628790 1744 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" not found" Oct 2 19:09:05.629510 kubelet[1744]: I1002 19:09:05.628827 1744 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:09:05.629510 kubelet[1744]: I1002 19:09:05.629006 1744 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:09:05.629706 kubelet[1744]: W1002 19:09:05.629481 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.629706 kubelet[1744]: E1002 19:09:05.629554 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.630500 kubelet[1744]: E1002 19:09:05.630475 1744 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.48:6443: connect: connection refused" interval="200ms" Oct 2 19:09:05.632000 audit[1755]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.632000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0f2b8a80 a2=0 a3=7ffe0f2b8a6c items=0 ppid=1744 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:09:05.634000 audit[1756]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.634000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffededabe50 a2=0 a3=7ffededabe3c items=0 ppid=1744 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:09:05.652000 audit[1758]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.652000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff540c25f0 a2=0 a3=7fff540c25dc items=0 ppid=1744 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:05.656000 audit[1760]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.656000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2062b8c0 a2=0 a3=7ffc2062b8ac items=0 ppid=1744 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:05.669000 audit[1763]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.669000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff1ca9ecc0 a2=0 a3=7fff1ca9ecac items=0 ppid=1744 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:09:05.670937 kubelet[1744]: I1002 19:09:05.670885 1744 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:09:05.673230 kubelet[1744]: I1002 19:09:05.673190 1744 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:09:05.673230 kubelet[1744]: I1002 19:09:05.673215 1744 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:09:05.673393 kubelet[1744]: I1002 19:09:05.673236 1744 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:05.673000 audit[1767]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.673000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca6e9b440 a2=0 a3=7ffca6e9b42c items=0 ppid=1744 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:09:05.675291 kubelet[1744]: I1002 19:09:05.674433 1744 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:09:05.675291 kubelet[1744]: I1002 19:09:05.674454 1744 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:09:05.675291 kubelet[1744]: I1002 19:09:05.674478 1744 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:09:05.675291 kubelet[1744]: E1002 19:09:05.674543 1744 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:09:05.675562 kubelet[1744]: W1002 19:09:05.675455 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.675562 kubelet[1744]: E1002 19:09:05.675494 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:05.675664 kubelet[1744]: I1002 19:09:05.675602 1744 policy_none.go:49] "None policy: Start" Oct 2 19:09:05.676700 kubelet[1744]: I1002 19:09:05.676673 1744 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:09:05.676822 kubelet[1744]: I1002 19:09:05.676711 1744 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:09:05.676000 audit[1768]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.676000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0f92f1f0 a2=0 a3=7fff0f92f1dc items=0 ppid=1744 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:05.678000 audit[1769]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.678000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd01c910f0 a2=0 a3=7ffd01c910dc items=0 ppid=1744 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:09:05.681000 audit[1772]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.681000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcc9a2f820 a2=0 a3=7ffcc9a2f80c items=0 ppid=1744 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:05.683000 audit[1770]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.683000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd19cbe4b0 a2=0 a3=7ffd19cbe49c items=0 ppid=1744 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:09:05.684000 audit[1774]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:05.684000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd899b87a0 a2=0 a3=7ffd899b878c items=0 ppid=1744 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:05.687546 systemd[1]: Created slice kubepods.slice. Oct 2 19:09:05.692000 audit[1775]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:05.692000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4c9212b0 a2=0 a3=7ffd4c92129c items=0 ppid=1744 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:09:05.695929 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:09:05.700128 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:09:05.710194 kubelet[1744]: I1002 19:09:05.710065 1744 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:09:05.710513 kubelet[1744]: I1002 19:09:05.710495 1744 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:09:05.709000 audit[1744]: AVC avc: denied { mac_admin } for pid=1744 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:05.709000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:05.709000 audit[1744]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000741e90 a1=c000e07260 a2=c000741e60 a3=25 items=0 ppid=1 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.709000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:05.712818 kubelet[1744]: I1002 19:09:05.712789 1744 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:09:05.713861 kubelet[1744]: E1002 19:09:05.713829 1744 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" not found" Oct 2 19:09:05.736332 kubelet[1744]: I1002 19:09:05.736301 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.736906 kubelet[1744]: E1002 19:09:05.736877 1744 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.48:6443/api/v1/nodes\": dial tcp 10.128.0.48:6443: connect: connection refused" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.775120 kubelet[1744]: I1002 19:09:05.775069 1744 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:05.780224 kubelet[1744]: I1002 19:09:05.780185 1744 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:05.791103 kubelet[1744]: I1002 19:09:05.791080 1744 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:05.797074 systemd[1]: Created slice kubepods-burstable-pod0bb3d65b0217a9077bd7d02a92e0ef2b.slice. Oct 2 19:09:05.811136 systemd[1]: Created slice kubepods-burstable-podd5a4b49a361f6b72557e3dde1b8adab4.slice. Oct 2 19:09:05.817037 systemd[1]: Created slice kubepods-burstable-podc34483ed05aeccbf76117fc5f25644ae.slice. Oct 2 19:09:05.831028 kubelet[1744]: E1002 19:09:05.830995 1744 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.48:6443: connect: connection refused" interval="400ms" Oct 2 19:09:05.935391 kubelet[1744]: I1002 19:09:05.930620 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935391 kubelet[1744]: I1002 19:09:05.930680 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935391 kubelet[1744]: I1002 19:09:05.930718 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935391 kubelet[1744]: I1002 19:09:05.930752 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935699 kubelet[1744]: I1002 19:09:05.930790 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935699 kubelet[1744]: I1002 19:09:05.930861 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935699 kubelet[1744]: I1002 19:09:05.930902 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935699 kubelet[1744]: I1002 19:09:05.930941 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.935829 kubelet[1744]: I1002 19:09:05.930994 1744 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c34483ed05aeccbf76117fc5f25644ae-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"c34483ed05aeccbf76117fc5f25644ae\") " pod="kube-system/kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.942488 kubelet[1744]: I1002 19:09:05.942447 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:05.942880 kubelet[1744]: E1002 19:09:05.942857 1744 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.48:6443/api/v1/nodes\": dial tcp 10.128.0.48:6443: connect: connection refused" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:06.067060 kubelet[1744]: E1002 19:09:06.066904 1744 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal.178a5ffc0190f9f9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", UID:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 621088761, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 621088761, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.48:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.48:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:09:06.107282 env[1141]: time="2023-10-02T19:09:06.107201801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:0bb3d65b0217a9077bd7d02a92e0ef2b,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:06.115226 env[1141]: time="2023-10-02T19:09:06.115165767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:d5a4b49a361f6b72557e3dde1b8adab4,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:06.120113 env[1141]: time="2023-10-02T19:09:06.120055045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:c34483ed05aeccbf76117fc5f25644ae,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:06.232758 kubelet[1744]: E1002 19:09:06.232633 1744 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.48:6443: connect: connection refused" interval="800ms" Oct 2 19:09:06.348280 kubelet[1744]: I1002 19:09:06.348204 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:06.348883 kubelet[1744]: E1002 19:09:06.348854 1744 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.48:6443/api/v1/nodes\": dial tcp 10.128.0.48:6443: connect: connection refused" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:06.473938 kubelet[1744]: W1002 19:09:06.473865 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:06.473938 kubelet[1744]: E1002 19:09:06.473945 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.48:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:06.606463 kubelet[1744]: W1002 19:09:06.606382 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:06.606463 kubelet[1744]: E1002 19:09:06.606457 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.48:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:06.887088 kubelet[1744]: W1002 19:09:06.886874 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:06.887088 kubelet[1744]: E1002 19:09:06.886958 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.48:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:07.033432 kubelet[1744]: E1002 19:09:07.033392 1744 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.48:6443: connect: connection refused" interval="1.6s" Oct 2 19:09:07.126204 kubelet[1744]: W1002 19:09:07.126157 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:07.126204 kubelet[1744]: E1002 19:09:07.126207 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.48:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:07.228962 kubelet[1744]: I1002 19:09:07.154881 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:07.228962 kubelet[1744]: E1002 19:09:07.155329 1744 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.48:6443/api/v1/nodes\": dial tcp 10.128.0.48:6443: connect: connection refused" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:07.726280 kubelet[1744]: E1002 19:09:07.726240 1744 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.48:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.48:6443: connect: connection refused Oct 2 19:09:08.399540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3515579518.mount: Deactivated successfully. Oct 2 19:09:08.406297 env[1141]: time="2023-10-02T19:09:08.406242987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.411865 env[1141]: time="2023-10-02T19:09:08.411814271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.414082 env[1141]: time="2023-10-02T19:09:08.414040329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.416586 env[1141]: time="2023-10-02T19:09:08.416542348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.420685 env[1141]: time="2023-10-02T19:09:08.420628300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.423061 env[1141]: time="2023-10-02T19:09:08.423023365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.424912 env[1141]: time="2023-10-02T19:09:08.424873373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.429866 env[1141]: time="2023-10-02T19:09:08.429812644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.431698 env[1141]: time="2023-10-02T19:09:08.431662626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.433945 env[1141]: time="2023-10-02T19:09:08.433911234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.437365 env[1141]: time="2023-10-02T19:09:08.437309397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.440992 env[1141]: time="2023-10-02T19:09:08.440932894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:08.467677 env[1141]: time="2023-10-02T19:09:08.467580728Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:08.467923 env[1141]: time="2023-10-02T19:09:08.467637551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:08.467923 env[1141]: time="2023-10-02T19:09:08.467662518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:08.468199 env[1141]: time="2023-10-02T19:09:08.468077121Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eca5d5f7083e727b50f78dc73512b1fbcd4cfbfb10be4b749c7cfae2249ad2a1 pid=1784 runtime=io.containerd.runc.v2 Oct 2 19:09:08.508618 systemd[1]: Started cri-containerd-eca5d5f7083e727b50f78dc73512b1fbcd4cfbfb10be4b749c7cfae2249ad2a1.scope. Oct 2 19:09:08.522756 env[1141]: time="2023-10-02T19:09:08.522650874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:08.523019 env[1141]: time="2023-10-02T19:09:08.522957965Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:08.523218 env[1141]: time="2023-10-02T19:09:08.523182152Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:08.523652 env[1141]: time="2023-10-02T19:09:08.523600629Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de0fdb851506ea371bd83775adf75b7d52cc69a1aa07203e22f36fe8019fcdd1 pid=1813 runtime=io.containerd.runc.v2 Oct 2 19:09:08.526878 env[1141]: time="2023-10-02T19:09:08.526804415Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:08.527084 env[1141]: time="2023-10-02T19:09:08.527046310Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:08.527277 env[1141]: time="2023-10-02T19:09:08.527241339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:08.527660 env[1141]: time="2023-10-02T19:09:08.527600381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91cb7a400bed976fdd313fbb017800ac0a943c98d7f66a6e9fa4a7b0b4c5ad89 pid=1819 runtime=io.containerd.runc.v2 Oct 2 19:09:08.551047 kernel: kauditd_printk_skb: 219 callbacks suppressed Oct 2 19:09:08.551196 kernel: audit: type=1400 audit(1696273748.537:619): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.571503 systemd[1]: Started cri-containerd-de0fdb851506ea371bd83775adf75b7d52cc69a1aa07203e22f36fe8019fcdd1.scope. Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.601003 kernel: audit: type=1400 audit(1696273748.537:620): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.625478 systemd[1]: Started cri-containerd-91cb7a400bed976fdd313fbb017800ac0a943c98d7f66a6e9fa4a7b0b4c5ad89.scope. Oct 2 19:09:08.642000 kernel: audit: type=1400 audit(1696273748.537:621): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.642063 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:08.674871 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:08.675083 kernel: audit: type=1400 audit(1696273748.537:622): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.675126 kernel: audit: backlog limit exceeded Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.679912 kubelet[1744]: E1002 19:09:08.679849 1744 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.48:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.48:6443: connect: connection refused" interval="3.2s" Oct 2 19:09:08.680527 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:08.693163 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:08.693320 kernel: audit: backlog limit exceeded Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.537000 audit: BPF prog-id=73 op=LOAD Oct 2 19:09:08.550000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.550000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1784 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613564356637303833653732376235306637386463373335313262 Oct 2 19:09:08.550000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.550000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1784 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613564356637303833653732376235306637386463373335313262 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.551000 audit: BPF prog-id=74 op=LOAD Oct 2 19:09:08.551000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300c20 items=0 ppid=1784 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613564356637303833653732376235306637386463373335313262 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.578000 audit: BPF prog-id=75 op=LOAD Oct 2 19:09:08.578000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390c78 items=0 ppid=1784 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613564356637303833653732376235306637386463373335313262 Oct 2 19:09:08.585000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:09:08.585000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.585000 audit: BPF prog-id=76 op=LOAD Oct 2 19:09:08.585000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000391088 items=0 ppid=1784 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563613564356637303833653732376235306637386463373335313262 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.696000 audit: BPF prog-id=77 op=LOAD Oct 2 19:09:08.699000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.699000 audit[1844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1813 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306664623835313530366561333731626438333737356164663735 Oct 2 19:09:08.699000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.699000 audit[1844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1813 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306664623835313530366561333731626438333737356164663735 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.701000 audit: BPF prog-id=78 op=LOAD Oct 2 19:09:08.701000 audit[1844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031a500 items=0 ppid=1813 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306664623835313530366561333731626438333737356164663735 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.703000 audit: BPF prog-id=79 op=LOAD Oct 2 19:09:08.703000 audit[1844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031a548 items=0 ppid=1813 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306664623835313530366561333731626438333737356164663735 Oct 2 19:09:08.704000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:09:08.704000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { perfmon } for pid=1844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit[1844]: AVC avc: denied { bpf } for pid=1844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.704000 audit: BPF prog-id=80 op=LOAD Oct 2 19:09:08.704000 audit[1844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031a958 items=0 ppid=1813 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306664623835313530366561333731626438333737356164663735 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.732000 audit: BPF prog-id=81 op=LOAD Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=1819 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931636237613430306265643937366664643331336662623031373830 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=1819 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931636237613430306265643937366664643331336662623031373830 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit: BPF prog-id=82 op=LOAD Oct 2 19:09:08.733000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0000243a0 items=0 ppid=1819 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931636237613430306265643937366664643331336662623031373830 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit: BPF prog-id=83 op=LOAD Oct 2 19:09:08.733000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0000243e8 items=0 ppid=1819 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931636237613430306265643937366664643331336662623031373830 Oct 2 19:09:08.733000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:09:08.733000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.733000 audit: BPF prog-id=84 op=LOAD Oct 2 19:09:08.733000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0000247f8 items=0 ppid=1819 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931636237613430306265643937366664643331336662623031373830 Oct 2 19:09:08.762598 kubelet[1744]: I1002 19:09:08.762400 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:08.763075 kubelet[1744]: E1002 19:09:08.763024 1744 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.48:6443/api/v1/nodes\": dial tcp 10.128.0.48:6443: connect: connection refused" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:08.763538 env[1141]: time="2023-10-02T19:09:08.763480401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:0bb3d65b0217a9077bd7d02a92e0ef2b,Namespace:kube-system,Attempt:0,} returns sandbox id \"eca5d5f7083e727b50f78dc73512b1fbcd4cfbfb10be4b749c7cfae2249ad2a1\"" Oct 2 19:09:08.766135 kubelet[1744]: E1002 19:09:08.765772 1744 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-21291" Oct 2 19:09:08.768891 env[1141]: time="2023-10-02T19:09:08.768846173Z" level=info msg="CreateContainer within sandbox \"eca5d5f7083e727b50f78dc73512b1fbcd4cfbfb10be4b749c7cfae2249ad2a1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:09:08.793723 env[1141]: time="2023-10-02T19:09:08.793665372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:c34483ed05aeccbf76117fc5f25644ae,Namespace:kube-system,Attempt:0,} returns sandbox id \"de0fdb851506ea371bd83775adf75b7d52cc69a1aa07203e22f36fe8019fcdd1\"" Oct 2 19:09:08.797396 kubelet[1744]: E1002 19:09:08.797072 1744 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-21291" Oct 2 19:09:08.799418 env[1141]: time="2023-10-02T19:09:08.799373326Z" level=info msg="CreateContainer within sandbox \"de0fdb851506ea371bd83775adf75b7d52cc69a1aa07203e22f36fe8019fcdd1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:09:08.800445 env[1141]: time="2023-10-02T19:09:08.800401908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal,Uid:d5a4b49a361f6b72557e3dde1b8adab4,Namespace:kube-system,Attempt:0,} returns sandbox id \"91cb7a400bed976fdd313fbb017800ac0a943c98d7f66a6e9fa4a7b0b4c5ad89\"" Oct 2 19:09:08.804391 kubelet[1744]: E1002 19:09:08.804329 1744 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flat" Oct 2 19:09:08.806626 env[1141]: time="2023-10-02T19:09:08.806582165Z" level=info msg="CreateContainer within sandbox \"91cb7a400bed976fdd313fbb017800ac0a943c98d7f66a6e9fa4a7b0b4c5ad89\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:09:08.818238 env[1141]: time="2023-10-02T19:09:08.818179285Z" level=info msg="CreateContainer within sandbox \"eca5d5f7083e727b50f78dc73512b1fbcd4cfbfb10be4b749c7cfae2249ad2a1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ac73140774260a39ef41478ef0ec46b3b4ddcbaf0027207bd777f63fc3b3f0c8\"" Oct 2 19:09:08.819654 env[1141]: time="2023-10-02T19:09:08.819597401Z" level=info msg="StartContainer for \"ac73140774260a39ef41478ef0ec46b3b4ddcbaf0027207bd777f63fc3b3f0c8\"" Oct 2 19:09:08.838246 env[1141]: time="2023-10-02T19:09:08.838177283Z" level=info msg="CreateContainer within sandbox \"de0fdb851506ea371bd83775adf75b7d52cc69a1aa07203e22f36fe8019fcdd1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"1f87ed8f770c04f46e1134afdcdc53b6e21f4c3efb027d2a09bef65b48b77b6b\"" Oct 2 19:09:08.838926 env[1141]: time="2023-10-02T19:09:08.838879985Z" level=info msg="StartContainer for \"1f87ed8f770c04f46e1134afdcdc53b6e21f4c3efb027d2a09bef65b48b77b6b\"" Oct 2 19:09:08.850151 env[1141]: time="2023-10-02T19:09:08.850104993Z" level=info msg="CreateContainer within sandbox \"91cb7a400bed976fdd313fbb017800ac0a943c98d7f66a6e9fa4a7b0b4c5ad89\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f737c0d962dca7df2c962fb3363a475d8f2909863762c6ec67ebe6d796faaa84\"" Oct 2 19:09:08.850871 env[1141]: time="2023-10-02T19:09:08.850829119Z" level=info msg="StartContainer for \"f737c0d962dca7df2c962fb3363a475d8f2909863762c6ec67ebe6d796faaa84\"" Oct 2 19:09:08.871533 systemd[1]: Started cri-containerd-ac73140774260a39ef41478ef0ec46b3b4ddcbaf0027207bd777f63fc3b3f0c8.scope. Oct 2 19:09:08.888577 systemd[1]: Started cri-containerd-1f87ed8f770c04f46e1134afdcdc53b6e21f4c3efb027d2a09bef65b48b77b6b.scope. Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.907000 audit: BPF prog-id=85 op=LOAD Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1784 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373331343037373432363061333965663431343738656630656334 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1784 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373331343037373432363061333965663431343738656630656334 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit: BPF prog-id=86 op=LOAD Oct 2 19:09:08.908000 audit[1916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003d2090 items=0 ppid=1784 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373331343037373432363061333965663431343738656630656334 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.908000 audit: BPF prog-id=87 op=LOAD Oct 2 19:09:08.908000 audit[1916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003d20d8 items=0 ppid=1784 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373331343037373432363061333965663431343738656630656334 Oct 2 19:09:08.908000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:09:08.908000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { perfmon } for pid=1916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit[1916]: AVC avc: denied { bpf } for pid=1916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.909000 audit: BPF prog-id=88 op=LOAD Oct 2 19:09:08.909000 audit[1916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d24e8 items=0 ppid=1784 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163373331343037373432363061333965663431343738656630656334 Oct 2 19:09:08.929498 systemd[1]: Started cri-containerd-f737c0d962dca7df2c962fb3363a475d8f2909863762c6ec67ebe6d796faaa84.scope. Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.954000 audit: BPF prog-id=89 op=LOAD Oct 2 19:09:08.956000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.956000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1813 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383765643866373730633034663436653131333461666463646335 Oct 2 19:09:08.957000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.957000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1813 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383765643866373730633034663436653131333461666463646335 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit: BPF prog-id=90 op=LOAD Oct 2 19:09:08.958000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003ca740 items=0 ppid=1813 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383765643866373730633034663436653131333461666463646335 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit: BPF prog-id=91 op=LOAD Oct 2 19:09:08.958000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003ca788 items=0 ppid=1813 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383765643866373730633034663436653131333461666463646335 Oct 2 19:09:08.958000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:09:08.958000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.958000 audit: BPF prog-id=92 op=LOAD Oct 2 19:09:08.958000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003cab98 items=0 ppid=1813 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383765643866373730633034663436653131333461666463646335 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit: BPF prog-id=93 op=LOAD Oct 2 19:09:08.992000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.992000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1819 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333763306439363264636137646632633936326662333336336134 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1819 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333763306439363264636137646632633936326662333336336134 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit: BPF prog-id=94 op=LOAD Oct 2 19:09:08.993000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038ee60 items=0 ppid=1819 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333763306439363264636137646632633936326662333336336134 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.993000 audit: BPF prog-id=95 op=LOAD Oct 2 19:09:08.993000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038eea8 items=0 ppid=1819 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333763306439363264636137646632633936326662333336336134 Oct 2 19:09:08.993000 audit: BPF prog-id=95 op=UNLOAD Oct 2 19:09:08.993000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:08.994000 audit: BPF prog-id=96 op=LOAD Oct 2 19:09:08.994000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038f2b8 items=0 ppid=1819 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637333763306439363264636137646632633936326662333336336134 Oct 2 19:09:08.997373 env[1141]: time="2023-10-02T19:09:08.994293428Z" level=info msg="StartContainer for \"ac73140774260a39ef41478ef0ec46b3b4ddcbaf0027207bd777f63fc3b3f0c8\" returns successfully" Oct 2 19:09:09.046199 env[1141]: time="2023-10-02T19:09:09.046131879Z" level=info msg="StartContainer for \"f737c0d962dca7df2c962fb3363a475d8f2909863762c6ec67ebe6d796faaa84\" returns successfully" Oct 2 19:09:09.112606 env[1141]: time="2023-10-02T19:09:09.112534659Z" level=info msg="StartContainer for \"1f87ed8f770c04f46e1134afdcdc53b6e21f4c3efb027d2a09bef65b48b77b6b\" returns successfully" Oct 2 19:09:10.727096 update_engine[1130]: I1002 19:09:10.727047 1130 update_attempter.cc:505] Updating boot flags... Oct 2 19:09:11.443000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:11.443000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000834b40 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:11.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:11.443000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:11.443000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003b0040 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:11.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:11.968849 kubelet[1744]: I1002 19:09:11.968805 1744 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:12.809000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.809000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00a95a340 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:12.812000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.812000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003b96510 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:12.816000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.816000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003b633e0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:12.822000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.822000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c003c1eff0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.822000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:12.849000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.849000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00573bb60 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:12.850000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:12.850000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003cf6180 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:09:12.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:09:13.077426 kubelet[1744]: E1002 19:09:13.077288 1744 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" not found" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:13.175609 kubelet[1744]: I1002 19:09:13.175549 1744 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:13.623364 kubelet[1744]: I1002 19:09:13.623305 1744 apiserver.go:52] "Watching apiserver" Oct 2 19:09:13.629354 kubelet[1744]: I1002 19:09:13.629308 1744 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:09:13.718105 kubelet[1744]: I1002 19:09:13.718059 1744 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:09:15.488158 kubelet[1744]: W1002 19:09:15.488122 1744 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:09:15.696124 kubelet[1744]: I1002 19:09:15.696082 1744 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" podStartSLOduration=0.695965809 podCreationTimestamp="2023-10-02 19:09:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:15.695655483 +0000 UTC m=+10.978849971" watchObservedRunningTime="2023-10-02 19:09:15.695965809 +0000 UTC m=+10.979160291" Oct 2 19:09:15.824249 systemd[1]: Reloading. Oct 2 19:09:15.934752 /usr/lib/systemd/system-generators/torcx-generator[2050]: time="2023-10-02T19:09:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:09:15.939950 /usr/lib/systemd/system-generators/torcx-generator[2050]: time="2023-10-02T19:09:15Z" level=info msg="torcx already run" Oct 2 19:09:16.042995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:09:16.043020 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:09:16.066671 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:09:16.260183 kernel: kauditd_printk_skb: 360 callbacks suppressed Oct 2 19:09:16.260364 kernel: audit: type=1400 audit(1696273756.233:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.297911 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:16.298075 kernel: audit: type=1400 audit(1696273756.233:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.298123 kernel: audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.330030 kernel: audit: type=1400 audit(1696273756.233:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.330172 kernel: audit: backlog limit exceeded Oct 2 19:09:16.330237 kernel: audit: type=1400 audit(1696273756.233:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.377722 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:09:16.377848 kernel: audit: type=1400 audit(1696273756.233:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.377919 kernel: audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.259000 audit: BPF prog-id=97 op=LOAD Oct 2 19:09:16.259000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.261000 audit: BPF prog-id=98 op=LOAD Oct 2 19:09:16.261000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.263000 audit: BPF prog-id=99 op=LOAD Oct 2 19:09:16.263000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.268000 audit: BPF prog-id=100 op=LOAD Oct 2 19:09:16.268000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit: BPF prog-id=101 op=LOAD Oct 2 19:09:16.270000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.349000 audit: BPF prog-id=102 op=LOAD Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.384000 audit: BPF prog-id=103 op=LOAD Oct 2 19:09:16.384000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit: BPF prog-id=104 op=LOAD Oct 2 19:09:16.385000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit: BPF prog-id=105 op=LOAD Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.385000 audit: BPF prog-id=106 op=LOAD Oct 2 19:09:16.385000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:09:16.385000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.388000 audit: BPF prog-id=107 op=LOAD Oct 2 19:09:16.388000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit: BPF prog-id=108 op=LOAD Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.390000 audit: BPF prog-id=109 op=LOAD Oct 2 19:09:16.390000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:09:16.390000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.391000 audit: BPF prog-id=110 op=LOAD Oct 2 19:09:16.391000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.393000 audit: BPF prog-id=111 op=LOAD Oct 2 19:09:16.393000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit: BPF prog-id=112 op=LOAD Oct 2 19:09:16.394000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit: BPF prog-id=113 op=LOAD Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.394000 audit: BPF prog-id=114 op=LOAD Oct 2 19:09:16.395000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:09:16.395000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit: BPF prog-id=115 op=LOAD Oct 2 19:09:16.397000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit: BPF prog-id=116 op=LOAD Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.397000 audit: BPF prog-id=117 op=LOAD Oct 2 19:09:16.397000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:09:16.397000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:09:16.421837 kubelet[1744]: I1002 19:09:16.421785 1744 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:09:16.422347 systemd[1]: Stopping kubelet.service... Oct 2 19:09:16.443538 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:09:16.443836 systemd[1]: Stopped kubelet.service. Oct 2 19:09:16.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:16.443938 systemd[1]: kubelet.service: Consumed 1.355s CPU time. Oct 2 19:09:16.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:16.446608 systemd[1]: Started kubelet.service. Oct 2 19:09:16.584354 kubelet[2094]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:16.584354 kubelet[2094]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:09:16.584354 kubelet[2094]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:09:16.585012 kubelet[2094]: I1002 19:09:16.584435 2094 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:09:16.591965 kubelet[2094]: I1002 19:09:16.591901 2094 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:09:16.591965 kubelet[2094]: I1002 19:09:16.591955 2094 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:09:16.592262 kubelet[2094]: I1002 19:09:16.592235 2094 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:09:16.595254 kubelet[2094]: I1002 19:09:16.595218 2094 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:09:16.597209 kubelet[2094]: I1002 19:09:16.597179 2094 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:09:16.604387 kubelet[2094]: I1002 19:09:16.604351 2094 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:09:16.604730 kubelet[2094]: I1002 19:09:16.604702 2094 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:09:16.604832 kubelet[2094]: I1002 19:09:16.604807 2094 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:09:16.605010 kubelet[2094]: I1002 19:09:16.604839 2094 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:09:16.605010 kubelet[2094]: I1002 19:09:16.604859 2094 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:09:16.605010 kubelet[2094]: I1002 19:09:16.604909 2094 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:16.611187 kubelet[2094]: I1002 19:09:16.611156 2094 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:09:16.611187 kubelet[2094]: I1002 19:09:16.611192 2094 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:09:16.611378 kubelet[2094]: I1002 19:09:16.611217 2094 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:09:16.611378 kubelet[2094]: I1002 19:09:16.611240 2094 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:09:16.612710 kubelet[2094]: I1002 19:09:16.612681 2094 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:09:16.654890 kubelet[2094]: I1002 19:09:16.654851 2094 server.go:1168] "Started kubelet" Oct 2 19:09:16.668528 kubelet[2094]: I1002 19:09:16.668495 2094 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:09:16.670000 audit[2094]: AVC avc: denied { mac_admin } for pid=2094 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.670000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:16.678766 kubelet[2094]: I1002 19:09:16.678727 2094 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:09:16.684129 kubelet[2094]: I1002 19:09:16.669087 2094 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:09:16.684395 kubelet[2094]: E1002 19:09:16.672525 2094 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:09:16.684488 kubelet[2094]: E1002 19:09:16.684416 2094 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:09:16.670000 audit[2094]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cb4ea0 a1=c000571680 a2=c000cb4e70 a3=25 items=0 ppid=1 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.670000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:16.683000 audit[2094]: AVC avc: denied { mac_admin } for pid=2094 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.683000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:16.685098 kubelet[2094]: I1002 19:09:16.684773 2094 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:09:16.683000 audit[2094]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc9460 a1=c000571d10 a2=c000cb5620 a3=25 items=0 ppid=1 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.683000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:16.686275 kubelet[2094]: I1002 19:09:16.686106 2094 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:09:16.686275 kubelet[2094]: I1002 19:09:16.686146 2094 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:09:16.706220 kubelet[2094]: I1002 19:09:16.706178 2094 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:09:16.708323 kubelet[2094]: I1002 19:09:16.708298 2094 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:09:16.731878 kubelet[2094]: I1002 19:09:16.731839 2094 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:09:16.735066 kubelet[2094]: I1002 19:09:16.735044 2094 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:09:16.735221 kubelet[2094]: I1002 19:09:16.735206 2094 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:09:16.735353 kubelet[2094]: I1002 19:09:16.735340 2094 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:09:16.735544 kubelet[2094]: E1002 19:09:16.735530 2094 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:09:16.814271 kubelet[2094]: I1002 19:09:16.814229 2094 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:16.830804 kubelet[2094]: I1002 19:09:16.830765 2094 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:16.831160 kubelet[2094]: I1002 19:09:16.831142 2094 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:16.832970 kubelet[2094]: I1002 19:09:16.832941 2094 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:09:16.833179 kubelet[2094]: I1002 19:09:16.833162 2094 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:09:16.833307 kubelet[2094]: I1002 19:09:16.833293 2094 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:09:16.833636 kubelet[2094]: I1002 19:09:16.833618 2094 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:09:16.833773 kubelet[2094]: I1002 19:09:16.833758 2094 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:09:16.833882 kubelet[2094]: I1002 19:09:16.833868 2094 policy_none.go:49] "None policy: Start" Oct 2 19:09:16.838413 kubelet[2094]: E1002 19:09:16.836094 2094 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:09:16.838606 kubelet[2094]: I1002 19:09:16.837237 2094 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:09:16.838739 kubelet[2094]: I1002 19:09:16.838724 2094 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:09:16.839074 kubelet[2094]: I1002 19:09:16.839055 2094 state_mem.go:75] "Updated machine memory state" Oct 2 19:09:16.845606 kubelet[2094]: I1002 19:09:16.845562 2094 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:09:16.845711 kubelet[2094]: I1002 19:09:16.845643 2094 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:09:16.845940 kubelet[2094]: I1002 19:09:16.845912 2094 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:09:16.844000 audit[2094]: AVC avc: denied { mac_admin } for pid=2094 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.844000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:09:16.844000 audit[2094]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ae7b0 a1=c00074cc18 a2=c0008ae780 a3=25 items=0 ppid=1 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.844000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:09:17.039413 kubelet[2094]: I1002 19:09:17.039358 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:17.039771 kubelet[2094]: I1002 19:09:17.039751 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:17.040001 kubelet[2094]: I1002 19:09:17.039959 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:17.065969 kubelet[2094]: W1002 19:09:17.065916 2094 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:09:17.068162 kubelet[2094]: W1002 19:09:17.068131 2094 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:09:17.069561 kubelet[2094]: W1002 19:09:17.069534 2094 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:09:17.069704 kubelet[2094]: E1002 19:09:17.069626 2094 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.114213 kubelet[2094]: I1002 19:09:17.114084 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.114535 kubelet[2094]: I1002 19:09:17.114516 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.114722 kubelet[2094]: I1002 19:09:17.114707 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0bb3d65b0217a9077bd7d02a92e0ef2b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"0bb3d65b0217a9077bd7d02a92e0ef2b\") " pod="kube-system/kube-apiserver-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.114925 kubelet[2094]: I1002 19:09:17.114893 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.115096 kubelet[2094]: I1002 19:09:17.115081 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.115282 kubelet[2094]: I1002 19:09:17.115268 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.116965 kubelet[2094]: I1002 19:09:17.116940 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c34483ed05aeccbf76117fc5f25644ae-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"c34483ed05aeccbf76117fc5f25644ae\") " pod="kube-system/kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.117190 kubelet[2094]: I1002 19:09:17.117175 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.117371 kubelet[2094]: I1002 19:09:17.117358 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5a4b49a361f6b72557e3dde1b8adab4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal\" (UID: \"d5a4b49a361f6b72557e3dde1b8adab4\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:09:17.621144 kubelet[2094]: I1002 19:09:17.621050 2094 apiserver.go:52] "Watching apiserver" Oct 2 19:09:17.709859 kubelet[2094]: I1002 19:09:17.709813 2094 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:09:17.720100 kubelet[2094]: I1002 19:09:17.720060 2094 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:09:17.793034 kubelet[2094]: I1002 19:09:17.792989 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" podStartSLOduration=0.792880432 podCreationTimestamp="2023-10-02 19:09:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:17.752803433 +0000 UTC m=+1.296958731" watchObservedRunningTime="2023-10-02 19:09:17.792880432 +0000 UTC m=+1.337035721" Oct 2 19:09:17.910048 kubelet[2094]: I1002 19:09:17.909881 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" podStartSLOduration=0.90982694 podCreationTimestamp="2023-10-02 19:09:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:17.836138522 +0000 UTC m=+1.380293817" watchObservedRunningTime="2023-10-02 19:09:17.90982694 +0000 UTC m=+1.453982238" Oct 2 19:09:20.630572 sudo[1361]: pam_unix(sudo:session): session closed for user root Oct 2 19:09:20.629000 audit[1361]: USER_END pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:20.629000 audit[1361]: CRED_DISP pid=1361 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:09:20.673257 sshd[1358]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:20.674000 audit[1358]: USER_END pid=1358 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:09:20.674000 audit[1358]: CRED_DISP pid=1358 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:09:20.677763 systemd[1]: sshd@8-10.128.0.48:22-147.75.109.163:55036.service: Deactivated successfully. Oct 2 19:09:20.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.48:22-147.75.109.163:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:20.678960 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:09:20.679253 systemd[1]: session-9.scope: Consumed 5.984s CPU time. Oct 2 19:09:20.680052 systemd-logind[1128]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:09:20.681493 systemd-logind[1128]: Removed session 9. Oct 2 19:09:28.486000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:09:28.492990 kernel: kauditd_printk_skb: 257 callbacks suppressed Oct 2 19:09:28.493112 kernel: audit: type=1400 audit(1696273768.486:985): avc: denied { watch } for pid=1970 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:09:28.486000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000843100 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:28.555119 kernel: audit: type=1300 audit(1696273768.486:985): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000843100 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:28.555267 kernel: audit: type=1327 audit(1696273768.486:985): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:28.486000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.288000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.316019 kernel: audit: type=1400 audit(1696273770.288:986): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.316171 kernel: audit: type=1400 audit(1696273770.293:987): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.293000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.293000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001310080 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.375314 kernel: audit: type=1300 audit(1696273770.293:987): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001310080 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.375482 kernel: audit: type=1327 audit(1696273770.293:987): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.294000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.294000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013100c0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.464236 kernel: audit: type=1400 audit(1696273770.294:988): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.464426 kernel: audit: type=1300 audit(1696273770.294:988): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013100c0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.464490 kernel: audit: type=1327 audit(1696273770.294:988): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.294000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:30.294000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001310100 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.288000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001169ac0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:09:30.288000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:30.914896 kubelet[2094]: I1002 19:09:30.914833 2094 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:09:30.915504 env[1141]: time="2023-10-02T19:09:30.915403148Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:09:30.915931 kubelet[2094]: I1002 19:09:30.915725 2094 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:09:31.755804 kubelet[2094]: I1002 19:09:31.755765 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:31.764465 systemd[1]: Created slice kubepods-besteffort-pod13813ed0_25c9_4839_8f48_c5f0a34d4812.slice. Oct 2 19:09:31.769596 kubelet[2094]: W1002 19:09:31.769567 2094 helpers.go:242] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-pod13813ed0_25c9_4839_8f48_c5f0a34d4812.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-pod13813ed0_25c9_4839_8f48_c5f0a34d4812.slice/cpuset.cpus.effective: no such device Oct 2 19:09:31.826037 kubelet[2094]: I1002 19:09:31.825997 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/13813ed0-25c9-4839-8f48-c5f0a34d4812-xtables-lock\") pod \"kube-proxy-57mn4\" (UID: \"13813ed0-25c9-4839-8f48-c5f0a34d4812\") " pod="kube-system/kube-proxy-57mn4" Oct 2 19:09:31.826365 kubelet[2094]: I1002 19:09:31.826342 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/13813ed0-25c9-4839-8f48-c5f0a34d4812-lib-modules\") pod \"kube-proxy-57mn4\" (UID: \"13813ed0-25c9-4839-8f48-c5f0a34d4812\") " pod="kube-system/kube-proxy-57mn4" Oct 2 19:09:31.826536 kubelet[2094]: I1002 19:09:31.826520 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76w9r\" (UniqueName: \"kubernetes.io/projected/13813ed0-25c9-4839-8f48-c5f0a34d4812-kube-api-access-76w9r\") pod \"kube-proxy-57mn4\" (UID: \"13813ed0-25c9-4839-8f48-c5f0a34d4812\") " pod="kube-system/kube-proxy-57mn4" Oct 2 19:09:31.826700 kubelet[2094]: I1002 19:09:31.826673 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/13813ed0-25c9-4839-8f48-c5f0a34d4812-kube-proxy\") pod \"kube-proxy-57mn4\" (UID: \"13813ed0-25c9-4839-8f48-c5f0a34d4812\") " pod="kube-system/kube-proxy-57mn4" Oct 2 19:09:31.890616 kubelet[2094]: I1002 19:09:31.890557 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:31.899329 systemd[1]: Created slice kubepods-besteffort-pod92d6e0fc_45f0_494f_b821_e1fe8baddf30.slice. Oct 2 19:09:31.927655 kubelet[2094]: I1002 19:09:31.927620 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-msv2d\" (UniqueName: \"kubernetes.io/projected/92d6e0fc-45f0-494f-b821-e1fe8baddf30-kube-api-access-msv2d\") pod \"tigera-operator-59c686f986-mnxhn\" (UID: \"92d6e0fc-45f0-494f-b821-e1fe8baddf30\") " pod="tigera-operator/tigera-operator-59c686f986-mnxhn" Oct 2 19:09:31.928333 kubelet[2094]: I1002 19:09:31.928310 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/92d6e0fc-45f0-494f-b821-e1fe8baddf30-var-lib-calico\") pod \"tigera-operator-59c686f986-mnxhn\" (UID: \"92d6e0fc-45f0-494f-b821-e1fe8baddf30\") " pod="tigera-operator/tigera-operator-59c686f986-mnxhn" Oct 2 19:09:32.075890 env[1141]: time="2023-10-02T19:09:32.075593426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-57mn4,Uid:13813ed0-25c9-4839-8f48-c5f0a34d4812,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:32.103886 env[1141]: time="2023-10-02T19:09:32.103788070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:32.103886 env[1141]: time="2023-10-02T19:09:32.103842892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:32.104227 env[1141]: time="2023-10-02T19:09:32.104173612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:32.104670 env[1141]: time="2023-10-02T19:09:32.104547705Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0 pid=2180 runtime=io.containerd.runc.v2 Oct 2 19:09:32.134263 systemd[1]: Started cri-containerd-d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0.scope. Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit: BPF prog-id=118 op=LOAD Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2180 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373165346130333334623433633039313365306535353636343566 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2180 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373165346130333334623433633039313365306535353636343566 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit: BPF prog-id=119 op=LOAD Oct 2 19:09:32.150000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000300350 items=0 ppid=2180 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373165346130333334623433633039313365306535353636343566 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.150000 audit: BPF prog-id=120 op=LOAD Oct 2 19:09:32.150000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000300398 items=0 ppid=2180 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373165346130333334623433633039313365306535353636343566 Oct 2 19:09:32.151000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:09:32.151000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.151000 audit: BPF prog-id=121 op=LOAD Oct 2 19:09:32.151000 audit[2191]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003007a8 items=0 ppid=2180 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431373165346130333334623433633039313365306535353636343566 Oct 2 19:09:32.167284 env[1141]: time="2023-10-02T19:09:32.167225922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-57mn4,Uid:13813ed0-25c9-4839-8f48-c5f0a34d4812,Namespace:kube-system,Attempt:0,} returns sandbox id \"d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0\"" Oct 2 19:09:32.172324 env[1141]: time="2023-10-02T19:09:32.172285867Z" level=info msg="CreateContainer within sandbox \"d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:09:32.190996 env[1141]: time="2023-10-02T19:09:32.190950446Z" level=info msg="CreateContainer within sandbox \"d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1ea2aba981984a28acef46641d4b864369b82820f87a76440bae5b3d85cbcf75\"" Oct 2 19:09:32.191903 env[1141]: time="2023-10-02T19:09:32.191868717Z" level=info msg="StartContainer for \"1ea2aba981984a28acef46641d4b864369b82820f87a76440bae5b3d85cbcf75\"" Oct 2 19:09:32.207124 env[1141]: time="2023-10-02T19:09:32.207077993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-mnxhn,Uid:92d6e0fc-45f0-494f-b821-e1fe8baddf30,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:09:32.219398 systemd[1]: Started cri-containerd-1ea2aba981984a28acef46641d4b864369b82820f87a76440bae5b3d85cbcf75.scope. Oct 2 19:09:32.245199 env[1141]: time="2023-10-02T19:09:32.245090384Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:32.245199 env[1141]: time="2023-10-02T19:09:32.245153425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:32.245539 env[1141]: time="2023-10-02T19:09:32.245475950Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:32.246265 env[1141]: time="2023-10-02T19:09:32.246161800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8587de628baab09aeaf87a436508887ecdbb4a9cd85909a26e6ebfb4c14bb49a pid=2243 runtime=io.containerd.runc.v2 Oct 2 19:09:32.254000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.254000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2180 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613261626139383139383461323861636566343636343164346238 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.255000 audit: BPF prog-id=122 op=LOAD Oct 2 19:09:32.255000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030a6d0 items=0 ppid=2180 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613261626139383139383461323861636566343636343164346238 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.256000 audit: BPF prog-id=123 op=LOAD Oct 2 19:09:32.256000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030a718 items=0 ppid=2180 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613261626139383139383461323861636566343636343164346238 Oct 2 19:09:32.257000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:09:32.257000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.257000 audit: BPF prog-id=124 op=LOAD Oct 2 19:09:32.257000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030a7a8 items=0 ppid=2180 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165613261626139383139383461323861636566343636343164346238 Oct 2 19:09:32.280187 systemd[1]: Started cri-containerd-8587de628baab09aeaf87a436508887ecdbb4a9cd85909a26e6ebfb4c14bb49a.scope. Oct 2 19:09:32.303179 env[1141]: time="2023-10-02T19:09:32.303125405Z" level=info msg="StartContainer for \"1ea2aba981984a28acef46641d4b864369b82820f87a76440bae5b3d85cbcf75\" returns successfully" Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit: BPF prog-id=125 op=LOAD Oct 2 19:09:32.318000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835383764653632386261616230396165616638376134333635303838 Oct 2 19:09:32.318000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.318000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835383764653632386261616230396165616638376134333635303838 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit: BPF prog-id=126 op=LOAD Oct 2 19:09:32.320000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002237b0 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835383764653632386261616230396165616638376134333635303838 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit: BPF prog-id=127 op=LOAD Oct 2 19:09:32.320000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002237f8 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835383764653632386261616230396165616638376134333635303838 Oct 2 19:09:32.320000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:09:32.320000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:32.320000 audit: BPF prog-id=128 op=LOAD Oct 2 19:09:32.320000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000223c08 items=0 ppid=2243 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835383764653632386261616230396165616638376134333635303838 Oct 2 19:09:32.375052 env[1141]: time="2023-10-02T19:09:32.374995339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-mnxhn,Uid:92d6e0fc-45f0-494f-b821-e1fe8baddf30,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8587de628baab09aeaf87a436508887ecdbb4a9cd85909a26e6ebfb4c14bb49a\"" Oct 2 19:09:32.381553 kubelet[2094]: E1002 19:09:32.381315 2094 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:09:32.382012 env[1141]: time="2023-10-02T19:09:32.381960084Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:09:32.418000 audit[2308]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.418000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffb42dde0 a2=0 a3=7ffffb42ddcc items=0 ppid=2237 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:32.420000 audit[2309]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.420000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe97766760 a2=0 a3=7ffe9776674c items=0 ppid=2237 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:32.422000 audit[2310]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.422000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcc476320 a2=0 a3=7ffdcc47630c items=0 ppid=2237 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:32.426000 audit[2311]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.426000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeb23b670 a2=0 a3=7ffeeb23b65c items=0 ppid=2237 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:09:32.428000 audit[2312]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.428000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc72d7d50 a2=0 a3=7ffdc72d7d3c items=0 ppid=2237 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:09:32.431000 audit[2313]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.431000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed3682680 a2=0 a3=7ffed368266c items=0 ppid=2237 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:09:32.520000 audit[2314]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.520000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd30470b50 a2=0 a3=7ffd30470b3c items=0 ppid=2237 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:32.523000 audit[2316]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.523000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2d43a6c0 a2=0 a3=7ffc2d43a6ac items=0 ppid=2237 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:09:32.529000 audit[2319]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.529000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb1a31470 a2=0 a3=7ffeb1a3145c items=0 ppid=2237 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:09:32.530000 audit[2320]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.530000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff93aa3bc0 a2=0 a3=7fff93aa3bac items=0 ppid=2237 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:32.535000 audit[2322]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.535000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc936b9930 a2=0 a3=7ffc936b991c items=0 ppid=2237 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:32.536000 audit[2323]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.536000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd387cb310 a2=0 a3=7ffd387cb2fc items=0 ppid=2237 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:32.539000 audit[2325]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.539000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe0e363780 a2=0 a3=7ffe0e36376c items=0 ppid=2237 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:32.545000 audit[2328]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.545000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe55a5ede0 a2=0 a3=7ffe55a5edcc items=0 ppid=2237 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:09:32.546000 audit[2329]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.546000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3b1de180 a2=0 a3=7ffe3b1de16c items=0 ppid=2237 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:32.550000 audit[2331]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.550000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed0a30760 a2=0 a3=7ffed0a3074c items=0 ppid=2237 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:32.552000 audit[2332]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.552000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe34fe8020 a2=0 a3=7ffe34fe800c items=0 ppid=2237 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.552000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:32.555000 audit[2334]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.555000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6be94bc0 a2=0 a3=7ffe6be94bac items=0 ppid=2237 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:32.560000 audit[2337]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.560000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde8fe8400 a2=0 a3=7ffde8fe83ec items=0 ppid=2237 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:32.565000 audit[2340]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.565000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0db76420 a2=0 a3=7ffe0db7640c items=0 ppid=2237 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:32.567000 audit[2341]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.567000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc4f518770 a2=0 a3=7ffc4f51875c items=0 ppid=2237 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:32.572000 audit[2343]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.572000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc18331690 a2=0 a3=7ffc1833167c items=0 ppid=2237 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:32.577000 audit[2346]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.577000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd283d7f0 a2=0 a3=7ffcd283d7dc items=0 ppid=2237 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:32.595000 audit[2351]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.595000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff2a8df60 a2=0 a3=7ffff2a8df4c items=0 ppid=2237 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:32.600000 audit[2353]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:09:32.600000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe0f5fedf0 a2=0 a3=7ffe0f5feddc items=0 ppid=2237 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:32.617000 audit[2355]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:32.617000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcad2f4bb0 a2=0 a3=7ffcad2f4b9c items=0 ppid=2237 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:32.625000 audit[2355]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:32.625000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcad2f4bb0 a2=0 a3=7ffcad2f4b9c items=0 ppid=2237 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:32.630000 audit[2361]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.630000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd47c42010 a2=0 a3=7ffd47c41ffc items=0 ppid=2237 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:09:32.634000 audit[2363]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.634000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9450b0e0 a2=0 a3=7ffd9450b0cc items=0 ppid=2237 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:09:32.639000 audit[2366]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.639000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde69b4120 a2=0 a3=7ffde69b410c items=0 ppid=2237 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:09:32.641000 audit[2367]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.641000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc80b8d010 a2=0 a3=7ffc80b8cffc items=0 ppid=2237 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:09:32.644000 audit[2369]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.644000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc23b49560 a2=0 a3=7ffc23b4954c items=0 ppid=2237 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:09:32.646000 audit[2370]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.646000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0267ef90 a2=0 a3=7ffd0267ef7c items=0 ppid=2237 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.646000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:09:32.651000 audit[2372]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.651000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdaa7c94d0 a2=0 a3=7ffdaa7c94bc items=0 ppid=2237 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:09:32.656000 audit[2375]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.656000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff0f5d8d40 a2=0 a3=7fff0f5d8d2c items=0 ppid=2237 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:09:32.658000 audit[2376]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.658000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcb4959a0 a2=0 a3=7ffdcb49598c items=0 ppid=2237 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:09:32.661000 audit[2378]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.661000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc06f4a640 a2=0 a3=7ffc06f4a62c items=0 ppid=2237 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:09:32.663000 audit[2379]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.663000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd80deb740 a2=0 a3=7ffd80deb72c items=0 ppid=2237 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:09:32.668000 audit[2381]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.668000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3a304f20 a2=0 a3=7fff3a304f0c items=0 ppid=2237 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:09:32.676000 audit[2384]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.676000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccadf4840 a2=0 a3=7ffccadf482c items=0 ppid=2237 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:09:32.681000 audit[2387]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.681000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe41b8edd0 a2=0 a3=7ffe41b8edbc items=0 ppid=2237 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:09:32.683000 audit[2388]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.683000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff94eaced0 a2=0 a3=7fff94eacebc items=0 ppid=2237 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:09:32.686000 audit[2390]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.686000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffefc286f50 a2=0 a3=7ffefc286f3c items=0 ppid=2237 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:32.691000 audit[2393]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.691000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd25356a90 a2=0 a3=7ffd25356a7c items=0 ppid=2237 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:09:32.693000 audit[2394]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.693000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb39e68c0 a2=0 a3=7ffeb39e68ac items=0 ppid=2237 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:09:32.697000 audit[2396]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.697000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe18a72d00 a2=0 a3=7ffe18a72cec items=0 ppid=2237 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:32.703000 audit[2399]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.703000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7e0bdf60 a2=0 a3=7ffc7e0bdf4c items=0 ppid=2237 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:09:32.705000 audit[2400]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.705000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3adf0d80 a2=0 a3=7fff3adf0d6c items=0 ppid=2237 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:09:32.708000 audit[2402]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:09:32.708000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd9bc83120 a2=0 a3=7ffd9bc8310c items=0 ppid=2237 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:09:32.713000 audit[2404]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:32.713000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffeff5f0480 a2=0 a3=7ffeff5f046c items=0 ppid=2237 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.713000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:32.714000 audit[2404]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:09:32.714000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffeff5f0480 a2=0 a3=7ffeff5f046c items=0 ppid=2237 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:32.714000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:32.817315 kubelet[2094]: I1002 19:09:32.817273 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-57mn4" podStartSLOduration=1.817211802 podCreationTimestamp="2023-10-02 19:09:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:32.815724169 +0000 UTC m=+16.359879466" watchObservedRunningTime="2023-10-02 19:09:32.817211802 +0000 UTC m=+16.361367097" Oct 2 19:09:32.946055 systemd[1]: run-containerd-runc-k8s.io-d171e4a0334b43c0913e0e556645f07ec459f3a8c8986345e7ac04054afe37b0-runc.gDwjzE.mount: Deactivated successfully. Oct 2 19:09:33.247465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3664459039.mount: Deactivated successfully. Oct 2 19:09:34.494216 env[1141]: time="2023-10-02T19:09:34.494148217Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:34.497062 env[1141]: time="2023-10-02T19:09:34.497020065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:34.499460 env[1141]: time="2023-10-02T19:09:34.499419823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:34.501719 env[1141]: time="2023-10-02T19:09:34.501677528Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:34.502623 env[1141]: time="2023-10-02T19:09:34.502571708Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:09:34.507697 env[1141]: time="2023-10-02T19:09:34.507634220Z" level=info msg="CreateContainer within sandbox \"8587de628baab09aeaf87a436508887ecdbb4a9cd85909a26e6ebfb4c14bb49a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:09:34.523669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1004794140.mount: Deactivated successfully. Oct 2 19:09:34.532782 env[1141]: time="2023-10-02T19:09:34.532726163Z" level=info msg="CreateContainer within sandbox \"8587de628baab09aeaf87a436508887ecdbb4a9cd85909a26e6ebfb4c14bb49a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"375e4de712b5b2823d5c8ee5690dc8912a1266c476f3df59d32a395c2a43738c\"" Oct 2 19:09:34.535483 env[1141]: time="2023-10-02T19:09:34.535429609Z" level=info msg="StartContainer for \"375e4de712b5b2823d5c8ee5690dc8912a1266c476f3df59d32a395c2a43738c\"" Oct 2 19:09:34.565480 systemd[1]: Started cri-containerd-375e4de712b5b2823d5c8ee5690dc8912a1266c476f3df59d32a395c2a43738c.scope. Oct 2 19:09:34.618970 kernel: kauditd_printk_skb: 315 callbacks suppressed Oct 2 19:09:34.619179 kernel: audit: type=1400 audit(1696273774.591:1083): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.641089 kernel: audit: type=1400 audit(1696273774.591:1084): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.664044 kernel: audit: type=1400 audit(1696273774.591:1085): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.706487 kernel: audit: type=1400 audit(1696273774.591:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.706622 kernel: audit: type=1400 audit(1696273774.591:1087): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.707433 kernel: audit: type=1400 audit(1696273774.591:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.734469 env[1141]: time="2023-10-02T19:09:34.734396540Z" level=info msg="StartContainer for \"375e4de712b5b2823d5c8ee5690dc8912a1266c476f3df59d32a395c2a43738c\" returns successfully" Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.774732 kernel: audit: type=1400 audit(1696273774.591:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.774875 kernel: audit: type=1400 audit(1696273774.591:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.818276 kernel: audit: type=1400 audit(1696273774.591:1091): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.818411 kernel: audit: type=1400 audit(1696273774.618:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.618000 audit: BPF prog-id=129 op=LOAD Oct 2 19:09:34.618000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.618000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2243 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356534646537313262356232383233643563386565353639306463 Oct 2 19:09:34.618000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.618000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2243 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356534646537313262356232383233643563386565353639306463 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.619000 audit: BPF prog-id=130 op=LOAD Oct 2 19:09:34.619000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210430 items=0 ppid=2243 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356534646537313262356232383233643563386565353639306463 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit: BPF prog-id=131 op=LOAD Oct 2 19:09:34.639000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000210478 items=0 ppid=2243 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356534646537313262356232383233643563386565353639306463 Oct 2 19:09:34.639000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:09:34.639000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:34.639000 audit: BPF prog-id=132 op=LOAD Oct 2 19:09:34.639000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000210888 items=0 ppid=2243 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337356534646537313262356232383233643563386565353639306463 Oct 2 19:09:36.774000 audit[2445]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:36.774000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffddf575500 a2=0 a3=7ffddf5754ec items=0 ppid=2237 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:36.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:36.775000 audit[2445]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:36.775000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffddf575500 a2=0 a3=31030 items=0 ppid=2237 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:36.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:36.782000 audit[2447]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:36.782000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd340275e0 a2=0 a3=7ffd340275cc items=0 ppid=2237 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:36.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:36.783000 audit[2447]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:36.783000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd340275e0 a2=0 a3=31030 items=0 ppid=2237 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:36.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:37.006225 kubelet[2094]: I1002 19:09:37.006174 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-mnxhn" podStartSLOduration=3.88099898 podCreationTimestamp="2023-10-02 19:09:31 +0000 UTC" firstStartedPulling="2023-10-02 19:09:32.377921509 +0000 UTC m=+15.922076795" lastFinishedPulling="2023-10-02 19:09:34.503025304 +0000 UTC m=+18.047180601" observedRunningTime="2023-10-02 19:09:34.828033637 +0000 UTC m=+18.372188932" watchObservedRunningTime="2023-10-02 19:09:37.006102786 +0000 UTC m=+20.550258084" Oct 2 19:09:37.007433 kubelet[2094]: I1002 19:09:37.007380 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:37.015966 systemd[1]: Created slice kubepods-besteffort-podad260e23_8f87_478d_b72f_5fc1b5dfab56.slice. Oct 2 19:09:37.062898 kubelet[2094]: I1002 19:09:37.062772 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad260e23-8f87-478d-b72f-5fc1b5dfab56-tigera-ca-bundle\") pod \"calico-typha-69bc9c9bfb-xhvrq\" (UID: \"ad260e23-8f87-478d-b72f-5fc1b5dfab56\") " pod="calico-system/calico-typha-69bc9c9bfb-xhvrq" Oct 2 19:09:37.063188 kubelet[2094]: I1002 19:09:37.063151 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ad260e23-8f87-478d-b72f-5fc1b5dfab56-typha-certs\") pod \"calico-typha-69bc9c9bfb-xhvrq\" (UID: \"ad260e23-8f87-478d-b72f-5fc1b5dfab56\") " pod="calico-system/calico-typha-69bc9c9bfb-xhvrq" Oct 2 19:09:37.063390 kubelet[2094]: I1002 19:09:37.063363 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqflf\" (UniqueName: \"kubernetes.io/projected/ad260e23-8f87-478d-b72f-5fc1b5dfab56-kube-api-access-gqflf\") pod \"calico-typha-69bc9c9bfb-xhvrq\" (UID: \"ad260e23-8f87-478d-b72f-5fc1b5dfab56\") " pod="calico-system/calico-typha-69bc9c9bfb-xhvrq" Oct 2 19:09:37.090023 kubelet[2094]: I1002 19:09:37.089964 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:37.098260 systemd[1]: Created slice kubepods-besteffort-pod98154c38_aa3b_42a9_ad6f_213a5f1bde43.slice. Oct 2 19:09:37.104401 kubelet[2094]: W1002 19:09:37.104372 2094 reflector.go:533] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' and this object Oct 2 19:09:37.104617 kubelet[2094]: E1002 19:09:37.104599 2094 reflector.go:148] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' and this object Oct 2 19:09:37.104946 kubelet[2094]: W1002 19:09:37.104912 2094 reflector.go:533] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' and this object Oct 2 19:09:37.105142 kubelet[2094]: E1002 19:09:37.105122 2094 reflector.go:148] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' and this object Oct 2 19:09:37.164452 kubelet[2094]: I1002 19:09:37.164412 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-cni-net-dir\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164452 kubelet[2094]: I1002 19:09:37.164469 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-cni-bin-dir\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164741 kubelet[2094]: I1002 19:09:37.164500 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-cni-log-dir\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164741 kubelet[2094]: I1002 19:09:37.164549 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-lib-modules\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164741 kubelet[2094]: I1002 19:09:37.164581 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-xtables-lock\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164741 kubelet[2094]: I1002 19:09:37.164614 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-policysync\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.164741 kubelet[2094]: I1002 19:09:37.164643 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-var-lib-calico\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.165054 kubelet[2094]: I1002 19:09:37.164676 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7vmn\" (UniqueName: \"kubernetes.io/projected/98154c38-aa3b-42a9-ad6f-213a5f1bde43-kube-api-access-z7vmn\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.165054 kubelet[2094]: I1002 19:09:37.164755 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/98154c38-aa3b-42a9-ad6f-213a5f1bde43-tigera-ca-bundle\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.165054 kubelet[2094]: I1002 19:09:37.164791 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/98154c38-aa3b-42a9-ad6f-213a5f1bde43-node-certs\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.165054 kubelet[2094]: I1002 19:09:37.164827 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-var-run-calico\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.165054 kubelet[2094]: I1002 19:09:37.164866 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/98154c38-aa3b-42a9-ad6f-213a5f1bde43-flexvol-driver-host\") pod \"calico-node-r24wf\" (UID: \"98154c38-aa3b-42a9-ad6f-213a5f1bde43\") " pod="calico-system/calico-node-r24wf" Oct 2 19:09:37.298268 kubelet[2094]: E1002 19:09:37.298238 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.298525 kubelet[2094]: W1002 19:09:37.298502 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.298660 kubelet[2094]: E1002 19:09:37.298639 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.342714 env[1141]: time="2023-10-02T19:09:37.341908172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-69bc9c9bfb-xhvrq,Uid:ad260e23-8f87-478d-b72f-5fc1b5dfab56,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:37.367420 kubelet[2094]: E1002 19:09:37.367304 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.367420 kubelet[2094]: W1002 19:09:37.367328 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.367420 kubelet[2094]: E1002 19:09:37.367358 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.372701 env[1141]: time="2023-10-02T19:09:37.372604702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:37.372948 env[1141]: time="2023-10-02T19:09:37.372898073Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:37.373187 env[1141]: time="2023-10-02T19:09:37.373135913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:37.373682 env[1141]: time="2023-10-02T19:09:37.373614229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fca81ca7d00338f5ecd22be473a1d5fead55171c6f483c508d80f381d1d6a3b pid=2458 runtime=io.containerd.runc.v2 Oct 2 19:09:37.410482 systemd[1]: Started cri-containerd-0fca81ca7d00338f5ecd22be473a1d5fead55171c6f483c508d80f381d1d6a3b.scope. Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.435000 audit: BPF prog-id=133 op=LOAD Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2458 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066636138316361376430303333386635656364323262653437336131 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2458 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066636138316361376430303333386635656364323262653437336131 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit: BPF prog-id=134 op=LOAD Oct 2 19:09:37.436000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002973e0 items=0 ppid=2458 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066636138316361376430303333386635656364323262653437336131 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.436000 audit: BPF prog-id=135 op=LOAD Oct 2 19:09:37.436000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000297428 items=0 ppid=2458 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066636138316361376430303333386635656364323262653437336131 Oct 2 19:09:37.437000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:09:37.437000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:37.437000 audit: BPF prog-id=136 op=LOAD Oct 2 19:09:37.437000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000297838 items=0 ppid=2458 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066636138316361376430303333386635656364323262653437336131 Oct 2 19:09:37.468307 kubelet[2094]: E1002 19:09:37.468273 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.468558 kubelet[2094]: W1002 19:09:37.468530 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.468722 kubelet[2094]: E1002 19:09:37.468703 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.493288 env[1141]: time="2023-10-02T19:09:37.493233130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-69bc9c9bfb-xhvrq,Uid:ad260e23-8f87-478d-b72f-5fc1b5dfab56,Namespace:calico-system,Attempt:0,} returns sandbox id \"0fca81ca7d00338f5ecd22be473a1d5fead55171c6f483c508d80f381d1d6a3b\"" Oct 2 19:09:37.495645 env[1141]: time="2023-10-02T19:09:37.495604533Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:09:37.570106 kubelet[2094]: E1002 19:09:37.570059 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.570394 kubelet[2094]: W1002 19:09:37.570371 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.570554 kubelet[2094]: E1002 19:09:37.570538 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.671940 kubelet[2094]: E1002 19:09:37.671832 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.672172 kubelet[2094]: W1002 19:09:37.672148 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.672285 kubelet[2094]: E1002 19:09:37.672271 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.773508 kubelet[2094]: E1002 19:09:37.773473 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.773770 kubelet[2094]: W1002 19:09:37.773741 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.773920 kubelet[2094]: E1002 19:09:37.773902 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.799000 audit[2497]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:37.799000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fffdea17e10 a2=0 a3=7fffdea17dfc items=0 ppid=2237 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:37.800000 audit[2497]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:37.800000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fffdea17e10 a2=0 a3=31030 items=0 ppid=2237 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:37.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:37.874762 kubelet[2094]: E1002 19:09:37.874718 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.875075 kubelet[2094]: W1002 19:09:37.875044 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.875253 kubelet[2094]: E1002 19:09:37.875232 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:37.976473 kubelet[2094]: E1002 19:09:37.976362 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:37.976473 kubelet[2094]: W1002 19:09:37.976396 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:37.976473 kubelet[2094]: E1002 19:09:37.976428 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.077730 kubelet[2094]: E1002 19:09:38.077676 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.077730 kubelet[2094]: W1002 19:09:38.077700 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.077730 kubelet[2094]: E1002 19:09:38.077728 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.179101 kubelet[2094]: E1002 19:09:38.179069 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.179101 kubelet[2094]: W1002 19:09:38.179093 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.179313 kubelet[2094]: E1002 19:09:38.179122 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.270238 kubelet[2094]: E1002 19:09:38.269553 2094 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 19:09:38.270238 kubelet[2094]: E1002 19:09:38.269678 2094 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/98154c38-aa3b-42a9-ad6f-213a5f1bde43-node-certs podName:98154c38-aa3b-42a9-ad6f-213a5f1bde43 nodeName:}" failed. No retries permitted until 2023-10-02 19:09:38.769637594 +0000 UTC m=+22.313792891 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/98154c38-aa3b-42a9-ad6f-213a5f1bde43-node-certs") pod "calico-node-r24wf" (UID: "98154c38-aa3b-42a9-ad6f-213a5f1bde43") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:09:38.279952 kubelet[2094]: E1002 19:09:38.279914 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.279952 kubelet[2094]: W1002 19:09:38.279936 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.280160 kubelet[2094]: E1002 19:09:38.279963 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.381075 kubelet[2094]: E1002 19:09:38.381041 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.381075 kubelet[2094]: W1002 19:09:38.381065 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.381352 kubelet[2094]: E1002 19:09:38.381092 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.475411 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3222983682.mount: Deactivated successfully. Oct 2 19:09:38.482032 kubelet[2094]: E1002 19:09:38.481909 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.482032 kubelet[2094]: W1002 19:09:38.481931 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.482032 kubelet[2094]: E1002 19:09:38.481959 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.583775 kubelet[2094]: E1002 19:09:38.583663 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.583775 kubelet[2094]: W1002 19:09:38.583689 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.583775 kubelet[2094]: E1002 19:09:38.583718 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.684529 kubelet[2094]: E1002 19:09:38.684494 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.684529 kubelet[2094]: W1002 19:09:38.684519 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.684750 kubelet[2094]: E1002 19:09:38.684545 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.785967 kubelet[2094]: E1002 19:09:38.785835 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.785967 kubelet[2094]: W1002 19:09:38.785868 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.785967 kubelet[2094]: E1002 19:09:38.785894 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.786320 kubelet[2094]: E1002 19:09:38.786310 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.786397 kubelet[2094]: W1002 19:09:38.786325 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.786397 kubelet[2094]: E1002 19:09:38.786346 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.786642 kubelet[2094]: E1002 19:09:38.786618 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.786770 kubelet[2094]: W1002 19:09:38.786638 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.786770 kubelet[2094]: E1002 19:09:38.786667 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.787025 kubelet[2094]: E1002 19:09:38.786921 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.787025 kubelet[2094]: W1002 19:09:38.786936 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.787025 kubelet[2094]: E1002 19:09:38.786956 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.787311 kubelet[2094]: E1002 19:09:38.787291 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.787311 kubelet[2094]: W1002 19:09:38.787308 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.787442 kubelet[2094]: E1002 19:09:38.787330 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.798573 kubelet[2094]: E1002 19:09:38.798550 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:38.798794 kubelet[2094]: W1002 19:09:38.798768 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:38.798895 kubelet[2094]: E1002 19:09:38.798800 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:38.904053 env[1141]: time="2023-10-02T19:09:38.903894084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r24wf,Uid:98154c38-aa3b-42a9-ad6f-213a5f1bde43,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:38.956692 env[1141]: time="2023-10-02T19:09:38.945857933Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:38.956692 env[1141]: time="2023-10-02T19:09:38.945905449Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:38.956692 env[1141]: time="2023-10-02T19:09:38.945925203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:38.956692 env[1141]: time="2023-10-02T19:09:38.946225439Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4 pid=2523 runtime=io.containerd.runc.v2 Oct 2 19:09:38.973496 systemd[1]: Started cri-containerd-ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4.scope. Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.005000 audit: BPF prog-id=137 op=LOAD Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313932323635343936316564393330316231313833346536326466 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313932323635343936316564393330316231313833346536326466 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit: BPF prog-id=138 op=LOAD Oct 2 19:09:39.006000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167ed0 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313932323635343936316564393330316231313833346536326466 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit: BPF prog-id=139 op=LOAD Oct 2 19:09:39.006000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000167f18 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313932323635343936316564393330316231313833346536326466 Oct 2 19:09:39.006000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:09:39.006000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:39.006000 audit: BPF prog-id=140 op=LOAD Oct 2 19:09:39.006000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000220328 items=0 ppid=2523 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163313932323635343936316564393330316231313833346536326466 Oct 2 19:09:39.030591 env[1141]: time="2023-10-02T19:09:39.030451397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r24wf,Uid:98154c38-aa3b-42a9-ad6f-213a5f1bde43,Namespace:calico-system,Attempt:0,} returns sandbox id \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\"" Oct 2 19:09:39.897695 env[1141]: time="2023-10-02T19:09:39.897623813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:39.908152 env[1141]: time="2023-10-02T19:09:39.908089936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:39.911363 env[1141]: time="2023-10-02T19:09:39.911308349Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:39.914444 env[1141]: time="2023-10-02T19:09:39.914389231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:39.915778 env[1141]: time="2023-10-02T19:09:39.915721119Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:09:39.918200 env[1141]: time="2023-10-02T19:09:39.918132572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:09:39.921157 env[1141]: time="2023-10-02T19:09:39.921062974Z" level=info msg="CreateContainer within sandbox \"0fca81ca7d00338f5ecd22be473a1d5fead55171c6f483c508d80f381d1d6a3b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:09:39.943336 env[1141]: time="2023-10-02T19:09:39.943257962Z" level=info msg="CreateContainer within sandbox \"0fca81ca7d00338f5ecd22be473a1d5fead55171c6f483c508d80f381d1d6a3b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b48714784e3134dcf27d5407a61a03b5d2135231d83585e1f371af31a6551165\"" Oct 2 19:09:39.946327 env[1141]: time="2023-10-02T19:09:39.944324013Z" level=info msg="StartContainer for \"b48714784e3134dcf27d5407a61a03b5d2135231d83585e1f371af31a6551165\"" Oct 2 19:09:39.976304 systemd[1]: Started cri-containerd-b48714784e3134dcf27d5407a61a03b5d2135231d83585e1f371af31a6551165.scope. Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.012736 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 19:09:40.012918 kernel: audit: type=1400 audit(1696273780.005:1143): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.054478 kernel: audit: type=1400 audit(1696273780.005:1144): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.054638 kernel: audit: type=1400 audit(1696273780.005:1145): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.095953 kernel: audit: type=1400 audit(1696273780.005:1146): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.118001 kernel: audit: type=1400 audit(1696273780.005:1147): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.161691 kernel: audit: type=1400 audit(1696273780.005:1148): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.161943 kernel: audit: type=1400 audit(1696273780.005:1149): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.182427 kernel: audit: type=1400 audit(1696273780.005:1150): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.226090 kernel: audit: type=1400 audit(1696273780.005:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.226252 kernel: audit: type=1400 audit(1696273780.005:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.005000 audit: BPF prog-id=141 op=LOAD Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2458 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234383731343738346533313334646366323764353430376136316130 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2458 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234383731343738346533313334646366323764353430376136316130 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.006000 audit: BPF prog-id=142 op=LOAD Oct 2 19:09:40.006000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa920 items=0 ppid=2458 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234383731343738346533313334646366323764353430376136316130 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.053000 audit: BPF prog-id=143 op=LOAD Oct 2 19:09:40.053000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa968 items=0 ppid=2458 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234383731343738346533313334646366323764353430376136316130 Oct 2 19:09:40.117000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:09:40.117000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:40.117000 audit: BPF prog-id=144 op=LOAD Oct 2 19:09:40.117000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aad78 items=0 ppid=2458 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234383731343738346533313334646366323764353430376136316130 Oct 2 19:09:40.236284 env[1141]: time="2023-10-02T19:09:40.236234439Z" level=info msg="StartContainer for \"b48714784e3134dcf27d5407a61a03b5d2135231d83585e1f371af31a6551165\" returns successfully" Oct 2 19:09:40.841991 kubelet[2094]: I1002 19:09:40.841928 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-69bc9c9bfb-xhvrq" podStartSLOduration=2.420490051 podCreationTimestamp="2023-10-02 19:09:36 +0000 UTC" firstStartedPulling="2023-10-02 19:09:37.494997763 +0000 UTC m=+21.039153032" lastFinishedPulling="2023-10-02 19:09:39.916387866 +0000 UTC m=+23.460543152" observedRunningTime="2023-10-02 19:09:40.841088013 +0000 UTC m=+24.385243308" watchObservedRunningTime="2023-10-02 19:09:40.841880171 +0000 UTC m=+24.386035466" Oct 2 19:09:40.891144 kubelet[2094]: E1002 19:09:40.891104 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.891506 kubelet[2094]: W1002 19:09:40.891481 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.890000 audit[2598]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:40.890000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd783cafd0 a2=0 a3=7ffd783cafbc items=0 ppid=2237 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:40.892042 kubelet[2094]: E1002 19:09:40.892019 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.892554 kubelet[2094]: E1002 19:09:40.892535 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.892735 kubelet[2094]: W1002 19:09:40.892713 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.892897 kubelet[2094]: E1002 19:09:40.892881 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.893380 kubelet[2094]: E1002 19:09:40.893350 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.893380 kubelet[2094]: W1002 19:09:40.893368 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.893557 kubelet[2094]: E1002 19:09:40.893389 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.893830 kubelet[2094]: E1002 19:09:40.893807 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.893830 kubelet[2094]: W1002 19:09:40.893825 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.894014 kubelet[2094]: E1002 19:09:40.893845 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.894329 kubelet[2094]: E1002 19:09:40.894309 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.894329 kubelet[2094]: W1002 19:09:40.894326 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.894493 kubelet[2094]: E1002 19:09:40.894346 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.894807 kubelet[2094]: E1002 19:09:40.894787 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.894807 kubelet[2094]: W1002 19:09:40.894803 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.894952 kubelet[2094]: E1002 19:09:40.894832 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.891000 audit[2598]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2598 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:40.891000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd783cafd0 a2=0 a3=7ffd783cafbc items=0 ppid=2237 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:40.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:40.895917 kubelet[2094]: E1002 19:09:40.895645 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.895917 kubelet[2094]: W1002 19:09:40.895662 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.895917 kubelet[2094]: E1002 19:09:40.895683 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.896174 kubelet[2094]: E1002 19:09:40.896003 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.896174 kubelet[2094]: W1002 19:09:40.896017 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.896174 kubelet[2094]: E1002 19:09:40.896036 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.896333 kubelet[2094]: E1002 19:09:40.896319 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.896333 kubelet[2094]: W1002 19:09:40.896330 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.896447 kubelet[2094]: E1002 19:09:40.896349 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.896745 kubelet[2094]: E1002 19:09:40.896713 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.896745 kubelet[2094]: W1002 19:09:40.896731 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.896896 kubelet[2094]: E1002 19:09:40.896750 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.897160 kubelet[2094]: E1002 19:09:40.897065 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.897160 kubelet[2094]: W1002 19:09:40.897081 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.897160 kubelet[2094]: E1002 19:09:40.897099 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.897657 kubelet[2094]: E1002 19:09:40.897637 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.897657 kubelet[2094]: W1002 19:09:40.897654 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.897794 kubelet[2094]: E1002 19:09:40.897673 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.909771 kubelet[2094]: E1002 19:09:40.909749 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.909883 kubelet[2094]: W1002 19:09:40.909767 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.909883 kubelet[2094]: E1002 19:09:40.909799 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.910227 kubelet[2094]: E1002 19:09:40.910204 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.910227 kubelet[2094]: W1002 19:09:40.910222 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.910362 kubelet[2094]: E1002 19:09:40.910249 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.910667 kubelet[2094]: E1002 19:09:40.910646 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.910667 kubelet[2094]: W1002 19:09:40.910664 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.910822 kubelet[2094]: E1002 19:09:40.910689 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.911097 kubelet[2094]: E1002 19:09:40.911078 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.911097 kubelet[2094]: W1002 19:09:40.911094 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.911239 kubelet[2094]: E1002 19:09:40.911119 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.911545 kubelet[2094]: E1002 19:09:40.911525 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.911545 kubelet[2094]: W1002 19:09:40.911541 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.911762 kubelet[2094]: E1002 19:09:40.911740 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.911872 kubelet[2094]: E1002 19:09:40.911809 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.911967 kubelet[2094]: W1002 19:09:40.911872 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.912112 kubelet[2094]: E1002 19:09:40.912094 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.912241 kubelet[2094]: E1002 19:09:40.912158 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.912241 kubelet[2094]: W1002 19:09:40.912240 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.912431 kubelet[2094]: E1002 19:09:40.912414 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.912518 kubelet[2094]: E1002 19:09:40.912498 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.912591 kubelet[2094]: W1002 19:09:40.912519 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.912591 kubelet[2094]: E1002 19:09:40.912537 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.912859 kubelet[2094]: E1002 19:09:40.912838 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.912859 kubelet[2094]: W1002 19:09:40.912856 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.913009 kubelet[2094]: E1002 19:09:40.912879 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.913335 kubelet[2094]: E1002 19:09:40.913314 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.913335 kubelet[2094]: W1002 19:09:40.913331 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.913489 kubelet[2094]: E1002 19:09:40.913356 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.913757 kubelet[2094]: E1002 19:09:40.913738 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.913757 kubelet[2094]: W1002 19:09:40.913755 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.913890 kubelet[2094]: E1002 19:09:40.913879 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.914536 kubelet[2094]: E1002 19:09:40.914207 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.914536 kubelet[2094]: W1002 19:09:40.914225 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.914536 kubelet[2094]: E1002 19:09:40.914384 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.915636 kubelet[2094]: E1002 19:09:40.915605 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.915854 kubelet[2094]: W1002 19:09:40.915811 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.915854 kubelet[2094]: E1002 19:09:40.915848 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.916280 kubelet[2094]: E1002 19:09:40.916258 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.916280 kubelet[2094]: W1002 19:09:40.916276 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.916436 kubelet[2094]: E1002 19:09:40.916301 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.916935 kubelet[2094]: E1002 19:09:40.916913 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.916935 kubelet[2094]: W1002 19:09:40.916931 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.917174 kubelet[2094]: E1002 19:09:40.917017 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.917451 kubelet[2094]: E1002 19:09:40.917430 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.917451 kubelet[2094]: W1002 19:09:40.917448 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.917595 kubelet[2094]: E1002 19:09:40.917468 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.917780 kubelet[2094]: E1002 19:09:40.917762 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.917780 kubelet[2094]: W1002 19:09:40.917780 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.917909 kubelet[2094]: E1002 19:09:40.917799 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:40.918611 kubelet[2094]: E1002 19:09:40.918588 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:40.918611 kubelet[2094]: W1002 19:09:40.918607 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:40.918746 kubelet[2094]: E1002 19:09:40.918626 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.817684 env[1141]: time="2023-10-02T19:09:41.817605540Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:41.823490 env[1141]: time="2023-10-02T19:09:41.823433110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:41.829227 env[1141]: time="2023-10-02T19:09:41.829162764Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:41.834066 env[1141]: time="2023-10-02T19:09:41.834037680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:41.839129 env[1141]: time="2023-10-02T19:09:41.835248170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:09:41.842654 env[1141]: time="2023-10-02T19:09:41.842130514Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:09:41.862385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount482250432.mount: Deactivated successfully. Oct 2 19:09:41.874754 env[1141]: time="2023-10-02T19:09:41.874697117Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034\"" Oct 2 19:09:41.875504 env[1141]: time="2023-10-02T19:09:41.875443675Z" level=info msg="StartContainer for \"d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034\"" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905242 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.906163 kubelet[2094]: W1002 19:09:41.905268 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905295 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905595 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.906163 kubelet[2094]: W1002 19:09:41.905608 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905629 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905872 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.906163 kubelet[2094]: W1002 19:09:41.905882 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.906163 kubelet[2094]: E1002 19:09:41.905898 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906219 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907134 kubelet[2094]: W1002 19:09:41.906232 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906253 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906507 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907134 kubelet[2094]: W1002 19:09:41.906518 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906537 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906791 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907134 kubelet[2094]: W1002 19:09:41.906803 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907134 kubelet[2094]: E1002 19:09:41.906821 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907626 kubelet[2094]: E1002 19:09:41.907168 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907626 kubelet[2094]: W1002 19:09:41.907181 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907626 kubelet[2094]: E1002 19:09:41.907199 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907626 kubelet[2094]: E1002 19:09:41.907448 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907626 kubelet[2094]: W1002 19:09:41.907457 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907626 kubelet[2094]: E1002 19:09:41.907475 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.907951 kubelet[2094]: E1002 19:09:41.907721 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.907951 kubelet[2094]: W1002 19:09:41.907733 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.907951 kubelet[2094]: E1002 19:09:41.907749 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908017 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.914911 kubelet[2094]: W1002 19:09:41.908029 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908050 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908362 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.914911 kubelet[2094]: W1002 19:09:41.908375 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908393 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908642 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.914911 kubelet[2094]: W1002 19:09:41.908652 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.914911 kubelet[2094]: E1002 19:09:41.908669 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.910160 systemd[1]: Started cri-containerd-d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034.scope. Oct 2 19:09:41.919045 kubelet[2094]: E1002 19:09:41.919019 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.919045 kubelet[2094]: W1002 19:09:41.919040 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.919244 kubelet[2094]: E1002 19:09:41.919062 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.919466 kubelet[2094]: E1002 19:09:41.919445 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.919466 kubelet[2094]: W1002 19:09:41.919463 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.919634 kubelet[2094]: E1002 19:09:41.919487 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.919844 kubelet[2094]: E1002 19:09:41.919824 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.919844 kubelet[2094]: W1002 19:09:41.919841 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.920056 kubelet[2094]: E1002 19:09:41.919865 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.920225 kubelet[2094]: E1002 19:09:41.920204 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.920225 kubelet[2094]: W1002 19:09:41.920221 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.920361 kubelet[2094]: E1002 19:09:41.920245 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.920554 kubelet[2094]: E1002 19:09:41.920536 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.920554 kubelet[2094]: W1002 19:09:41.920552 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.920709 kubelet[2094]: E1002 19:09:41.920674 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.920892 kubelet[2094]: E1002 19:09:41.920852 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.920892 kubelet[2094]: W1002 19:09:41.920868 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.921084 kubelet[2094]: E1002 19:09:41.921043 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.923536 kubelet[2094]: E1002 19:09:41.923488 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.923536 kubelet[2094]: W1002 19:09:41.923508 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.923727 kubelet[2094]: E1002 19:09:41.923629 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.923855 kubelet[2094]: E1002 19:09:41.923835 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.923855 kubelet[2094]: W1002 19:09:41.923851 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.924076 kubelet[2094]: E1002 19:09:41.923960 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.924217 kubelet[2094]: E1002 19:09:41.924197 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.924217 kubelet[2094]: W1002 19:09:41.924214 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.924368 kubelet[2094]: E1002 19:09:41.924327 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.924552 kubelet[2094]: E1002 19:09:41.924503 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.924552 kubelet[2094]: W1002 19:09:41.924521 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.924552 kubelet[2094]: E1002 19:09:41.924545 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.924846 kubelet[2094]: E1002 19:09:41.924825 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.924846 kubelet[2094]: W1002 19:09:41.924841 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.925006 kubelet[2094]: E1002 19:09:41.924866 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.925214 kubelet[2094]: E1002 19:09:41.925194 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.925214 kubelet[2094]: W1002 19:09:41.925211 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.925372 kubelet[2094]: E1002 19:09:41.925321 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.925738 kubelet[2094]: E1002 19:09:41.925705 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.925738 kubelet[2094]: W1002 19:09:41.925723 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.925912 kubelet[2094]: E1002 19:09:41.925834 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.926453 kubelet[2094]: E1002 19:09:41.926419 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.926453 kubelet[2094]: W1002 19:09:41.926436 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.926625 kubelet[2094]: E1002 19:09:41.926546 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.926758 kubelet[2094]: E1002 19:09:41.926738 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.926758 kubelet[2094]: W1002 19:09:41.926754 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.927096 kubelet[2094]: E1002 19:09:41.926779 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.927393 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.929261 kubelet[2094]: W1002 19:09:41.927409 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.927433 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.927746 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.929261 kubelet[2094]: W1002 19:09:41.927759 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.927777 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.928329 2094 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:09:41.929261 kubelet[2094]: W1002 19:09:41.928342 2094 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:09:41.929261 kubelet[2094]: E1002 19:09:41.928361 2094 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2523 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366236613965306363323966366533346662613435363062616166 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.943000 audit: BPF prog-id=145 op=LOAD Oct 2 19:09:41.943000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000361c60 items=0 ppid=2523 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366236613965306363323966366533346662613435363062616166 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit: BPF prog-id=146 op=LOAD Oct 2 19:09:41.944000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000361ca8 items=0 ppid=2523 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366236613965306363323966366533346662613435363062616166 Oct 2 19:09:41.944000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:09:41.944000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:41.944000 audit: BPF prog-id=147 op=LOAD Oct 2 19:09:41.944000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000361d38 items=0 ppid=2523 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433366236613965306363323966366533346662613435363062616166 Oct 2 19:09:41.969990 env[1141]: time="2023-10-02T19:09:41.969919877Z" level=info msg="StartContainer for \"d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034\" returns successfully" Oct 2 19:09:41.981357 systemd[1]: cri-containerd-d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034.scope: Deactivated successfully. Oct 2 19:09:41.984000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:09:42.011886 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034-rootfs.mount: Deactivated successfully. Oct 2 19:09:42.582690 env[1141]: time="2023-10-02T19:09:42.582626533Z" level=info msg="shim disconnected" id=d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034 Oct 2 19:09:42.583122 env[1141]: time="2023-10-02T19:09:42.583031541Z" level=warning msg="cleaning up after shim disconnected" id=d36b6a9e0cc29f6e34fba4560baaf5f53734b94eb2463ff72e301ab41cc3e034 namespace=k8s.io Oct 2 19:09:42.583122 env[1141]: time="2023-10-02T19:09:42.583063311Z" level=info msg="cleaning up dead shim" Oct 2 19:09:42.595477 env[1141]: time="2023-10-02T19:09:42.595415461Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2707 runtime=io.containerd.runc.v2\n" Oct 2 19:09:42.841080 env[1141]: time="2023-10-02T19:09:42.840542920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:09:43.716260 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3861328047.mount: Deactivated successfully. Oct 2 19:09:47.255395 env[1141]: time="2023-10-02T19:09:47.255315765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:47.258261 env[1141]: time="2023-10-02T19:09:47.258215190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:47.260816 env[1141]: time="2023-10-02T19:09:47.260778222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:47.263849 env[1141]: time="2023-10-02T19:09:47.263801108Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:47.264945 env[1141]: time="2023-10-02T19:09:47.264857066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:09:47.273363 env[1141]: time="2023-10-02T19:09:47.272815605Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:09:47.291736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3899840527.mount: Deactivated successfully. Oct 2 19:09:47.298721 env[1141]: time="2023-10-02T19:09:47.298650266Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c\"" Oct 2 19:09:47.302579 env[1141]: time="2023-10-02T19:09:47.299759338Z" level=info msg="StartContainer for \"26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c\"" Oct 2 19:09:47.341811 systemd[1]: Started cri-containerd-26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c.scope. Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.373777 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:09:47.373914 kernel: audit: type=1400 audit(1696273787.367:1170): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2523 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.426934 kernel: audit: type=1300 audit(1696273787.367:1170): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2523 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.427161 kernel: audit: type=1327 audit(1696273787.367:1170): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656534653135336136363730313932643666333937666331373435 Oct 2 19:09:47.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656534653135336136363730313932643666333937666331373435 Oct 2 19:09:47.456841 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.497825 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.498056 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.522035 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.528134 env[1141]: time="2023-10-02T19:09:47.528081938Z" level=info msg="StartContainer for \"26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c\" returns successfully" Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.583037 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.583198 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.604272 kernel: audit: type=1400 audit(1696273787.367:1171): avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.367000 audit: BPF prog-id=148 op=LOAD Oct 2 19:09:47.367000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b90a0 items=0 ppid=2523 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656534653135336136363730313932643666333937666331373435 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit: BPF prog-id=149 op=LOAD Oct 2 19:09:47.393000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b90e8 items=0 ppid=2523 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656534653135336136363730313932643666333937666331373435 Oct 2 19:09:47.393000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:09:47.393000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:47.393000 audit: BPF prog-id=150 op=LOAD Oct 2 19:09:47.393000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b9178 items=0 ppid=2523 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236656534653135336136363730313932643666333937666331373435 Oct 2 19:09:48.384600 env[1141]: time="2023-10-02T19:09:48.384517454Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:09:48.388337 systemd[1]: cri-containerd-26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c.scope: Deactivated successfully. Oct 2 19:09:48.390000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:09:48.417750 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c-rootfs.mount: Deactivated successfully. Oct 2 19:09:48.439245 kubelet[2094]: I1002 19:09:48.439197 2094 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:09:48.480912 kubelet[2094]: I1002 19:09:48.480859 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:48.488956 systemd[1]: Created slice kubepods-burstable-pod8468013a_35fe_4495_942c_46dd66936e3b.slice. Oct 2 19:09:48.492603 kubelet[2094]: I1002 19:09:48.492550 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:48.499456 kubelet[2094]: I1002 19:09:48.499415 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:48.505260 systemd[1]: Created slice kubepods-burstable-poddc11dcf6_6adf_4367_95d8_eb8f31460f7c.slice. Oct 2 19:09:48.515304 systemd[1]: Created slice kubepods-besteffort-pod2faa1229_d753_4b8a_a619_ef2ad245108c.slice. Oct 2 19:09:48.519383 kubelet[2094]: I1002 19:09:48.519350 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:09:48.528155 systemd[1]: Created slice kubepods-besteffort-podfb77709d_d2cd_400a_a395_69f5f0b19a47.slice. Oct 2 19:09:48.583372 kubelet[2094]: I1002 19:09:48.583332 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jwq59\" (UniqueName: \"kubernetes.io/projected/fb77709d-d2cd-400a-a395-69f5f0b19a47-kube-api-access-jwq59\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.583689 kubelet[2094]: I1002 19:09:48.583670 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljp7j\" (UniqueName: \"kubernetes.io/projected/dc11dcf6-6adf-4367-95d8-eb8f31460f7c-kube-api-access-ljp7j\") pod \"coredns-5d78c9869d-wsv26\" (UID: \"dc11dcf6-6adf-4367-95d8-eb8f31460f7c\") " pod="kube-system/coredns-5d78c9869d-wsv26" Oct 2 19:09:48.583898 kubelet[2094]: I1002 19:09:48.583884 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fb77709d-d2cd-400a-a395-69f5f0b19a47-varrun\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.584146 kubelet[2094]: I1002 19:09:48.584129 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6jxc4\" (UniqueName: \"kubernetes.io/projected/2faa1229-d753-4b8a-a619-ef2ad245108c-kube-api-access-6jxc4\") pod \"calico-kube-controllers-7bd445fdb4-h4dlx\" (UID: \"2faa1229-d753-4b8a-a619-ef2ad245108c\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" Oct 2 19:09:48.584361 kubelet[2094]: I1002 19:09:48.584347 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fb77709d-d2cd-400a-a395-69f5f0b19a47-kubelet-dir\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.584564 kubelet[2094]: I1002 19:09:48.584550 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fb77709d-d2cd-400a-a395-69f5f0b19a47-registration-dir\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.584755 kubelet[2094]: I1002 19:09:48.584741 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/dc11dcf6-6adf-4367-95d8-eb8f31460f7c-config-volume\") pod \"coredns-5d78c9869d-wsv26\" (UID: \"dc11dcf6-6adf-4367-95d8-eb8f31460f7c\") " pod="kube-system/coredns-5d78c9869d-wsv26" Oct 2 19:09:48.584939 kubelet[2094]: I1002 19:09:48.584926 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/fb77709d-d2cd-400a-a395-69f5f0b19a47-etccalico\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.585173 kubelet[2094]: I1002 19:09:48.585156 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b2z8w\" (UniqueName: \"kubernetes.io/projected/8468013a-35fe-4495-942c-46dd66936e3b-kube-api-access-b2z8w\") pod \"coredns-5d78c9869d-gvsnl\" (UID: \"8468013a-35fe-4495-942c-46dd66936e3b\") " pod="kube-system/coredns-5d78c9869d-gvsnl" Oct 2 19:09:48.585368 kubelet[2094]: I1002 19:09:48.585353 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fb77709d-d2cd-400a-a395-69f5f0b19a47-socket-dir\") pod \"csi-node-driver-bgqn6\" (UID: \"fb77709d-d2cd-400a-a395-69f5f0b19a47\") " pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:48.585532 kubelet[2094]: I1002 19:09:48.585517 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8468013a-35fe-4495-942c-46dd66936e3b-config-volume\") pod \"coredns-5d78c9869d-gvsnl\" (UID: \"8468013a-35fe-4495-942c-46dd66936e3b\") " pod="kube-system/coredns-5d78c9869d-gvsnl" Oct 2 19:09:48.797277 env[1141]: time="2023-10-02T19:09:48.797206866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvsnl,Uid:8468013a-35fe-4495-942c-46dd66936e3b,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:48.814240 env[1141]: time="2023-10-02T19:09:48.813245258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wsv26,Uid:dc11dcf6-6adf-4367-95d8-eb8f31460f7c,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:48.823962 env[1141]: time="2023-10-02T19:09:48.823914313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-h4dlx,Uid:2faa1229-d753-4b8a-a619-ef2ad245108c,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:48.833578 env[1141]: time="2023-10-02T19:09:48.833516964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bgqn6,Uid:fb77709d-d2cd-400a-a395-69f5f0b19a47,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:49.140698 env[1141]: time="2023-10-02T19:09:49.140116288Z" level=info msg="shim disconnected" id=26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c Oct 2 19:09:49.140698 env[1141]: time="2023-10-02T19:09:49.140174740Z" level=warning msg="cleaning up after shim disconnected" id=26ee4e153a6670192d6f397fc174500eb9c9823ecd112f9a84f629767d42522c namespace=k8s.io Oct 2 19:09:49.140698 env[1141]: time="2023-10-02T19:09:49.140207713Z" level=info msg="cleaning up dead shim" Oct 2 19:09:49.154454 env[1141]: time="2023-10-02T19:09:49.154401039Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:09:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2780 runtime=io.containerd.runc.v2\n" Oct 2 19:09:49.362722 env[1141]: time="2023-10-02T19:09:49.362637271Z" level=error msg="Failed to destroy network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.363436 env[1141]: time="2023-10-02T19:09:49.363377321Z" level=error msg="encountered an error cleaning up failed sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.363679 env[1141]: time="2023-10-02T19:09:49.363630928Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-h4dlx,Uid:2faa1229-d753-4b8a-a619-ef2ad245108c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.364683 kubelet[2094]: E1002 19:09:49.364190 2094 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.364683 kubelet[2094]: E1002 19:09:49.364271 2094 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" Oct 2 19:09:49.364683 kubelet[2094]: E1002 19:09:49.364305 2094 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" Oct 2 19:09:49.365025 kubelet[2094]: E1002 19:09:49.364378 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-h4dlx_calico-system(2faa1229-d753-4b8a-a619-ef2ad245108c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-h4dlx_calico-system(2faa1229-d753-4b8a-a619-ef2ad245108c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" podUID=2faa1229-d753-4b8a-a619-ef2ad245108c Oct 2 19:09:49.388368 env[1141]: time="2023-10-02T19:09:49.388298059Z" level=error msg="Failed to destroy network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.389373 env[1141]: time="2023-10-02T19:09:49.389299592Z" level=error msg="encountered an error cleaning up failed sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.389530 env[1141]: time="2023-10-02T19:09:49.389390673Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wsv26,Uid:dc11dcf6-6adf-4367-95d8-eb8f31460f7c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.389722 kubelet[2094]: E1002 19:09:49.389672 2094 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.389842 kubelet[2094]: E1002 19:09:49.389745 2094 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-wsv26" Oct 2 19:09:49.389842 kubelet[2094]: E1002 19:09:49.389780 2094 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-wsv26" Oct 2 19:09:49.390010 kubelet[2094]: E1002 19:09:49.389845 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-wsv26_kube-system(dc11dcf6-6adf-4367-95d8-eb8f31460f7c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-wsv26_kube-system(dc11dcf6-6adf-4367-95d8-eb8f31460f7c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-wsv26" podUID=dc11dcf6-6adf-4367-95d8-eb8f31460f7c Oct 2 19:09:49.401159 env[1141]: time="2023-10-02T19:09:49.400986298Z" level=error msg="Failed to destroy network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.402598 env[1141]: time="2023-10-02T19:09:49.402542065Z" level=error msg="encountered an error cleaning up failed sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.402739 env[1141]: time="2023-10-02T19:09:49.402625577Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvsnl,Uid:8468013a-35fe-4495-942c-46dd66936e3b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.404545 kubelet[2094]: E1002 19:09:49.403008 2094 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.404545 kubelet[2094]: E1002 19:09:49.403072 2094 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvsnl" Oct 2 19:09:49.404545 kubelet[2094]: E1002 19:09:49.403107 2094 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gvsnl" Oct 2 19:09:49.404808 kubelet[2094]: E1002 19:09:49.403178 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gvsnl_kube-system(8468013a-35fe-4495-942c-46dd66936e3b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gvsnl_kube-system(8468013a-35fe-4495-942c-46dd66936e3b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvsnl" podUID=8468013a-35fe-4495-942c-46dd66936e3b Oct 2 19:09:49.433248 env[1141]: time="2023-10-02T19:09:49.433182013Z" level=error msg="Failed to destroy network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.437490 env[1141]: time="2023-10-02T19:09:49.436686852Z" level=error msg="encountered an error cleaning up failed sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.437490 env[1141]: time="2023-10-02T19:09:49.436770594Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bgqn6,Uid:fb77709d-d2cd-400a-a395-69f5f0b19a47,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.436228 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a-shm.mount: Deactivated successfully. Oct 2 19:09:49.438441 kubelet[2094]: E1002 19:09:49.438242 2094 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.438441 kubelet[2094]: E1002 19:09:49.438341 2094 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:49.438441 kubelet[2094]: E1002 19:09:49.438382 2094 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bgqn6" Oct 2 19:09:49.438664 kubelet[2094]: E1002 19:09:49.438453 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:09:49.854032 kubelet[2094]: I1002 19:09:49.853968 2094 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:09:49.855936 env[1141]: time="2023-10-02T19:09:49.855893518Z" level=info msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" Oct 2 19:09:49.856132 kubelet[2094]: I1002 19:09:49.856094 2094 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:09:49.857003 env[1141]: time="2023-10-02T19:09:49.856835520Z" level=info msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" Oct 2 19:09:49.867140 env[1141]: time="2023-10-02T19:09:49.867099205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:09:49.878005 kubelet[2094]: I1002 19:09:49.876345 2094 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:09:49.878203 env[1141]: time="2023-10-02T19:09:49.877768945Z" level=info msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" Oct 2 19:09:49.881859 kubelet[2094]: I1002 19:09:49.881828 2094 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:09:49.883862 env[1141]: time="2023-10-02T19:09:49.883812813Z" level=info msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" Oct 2 19:09:49.973343 env[1141]: time="2023-10-02T19:09:49.973253631Z" level=error msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" failed" error="failed to destroy network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.973671 kubelet[2094]: E1002 19:09:49.973640 2094 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:09:49.973808 kubelet[2094]: E1002 19:09:49.973724 2094 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd} Oct 2 19:09:49.973808 kubelet[2094]: E1002 19:09:49.973794 2094 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2faa1229-d753-4b8a-a619-ef2ad245108c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:49.974038 kubelet[2094]: E1002 19:09:49.973841 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2faa1229-d753-4b8a-a619-ef2ad245108c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" podUID=2faa1229-d753-4b8a-a619-ef2ad245108c Oct 2 19:09:49.994528 env[1141]: time="2023-10-02T19:09:49.994431052Z" level=error msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" failed" error="failed to destroy network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.997014 env[1141]: time="2023-10-02T19:09:49.994768487Z" level=error msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" failed" error="failed to destroy network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.997014 env[1141]: time="2023-10-02T19:09:49.996095662Z" level=error msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" failed" error="failed to destroy network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:49.997217 kubelet[2094]: E1002 19:09:49.995008 2094 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:09:49.997217 kubelet[2094]: E1002 19:09:49.995057 2094 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd} Oct 2 19:09:49.997217 kubelet[2094]: E1002 19:09:49.995134 2094 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8468013a-35fe-4495-942c-46dd66936e3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:49.997217 kubelet[2094]: E1002 19:09:49.995193 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8468013a-35fe-4495-942c-46dd66936e3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gvsnl" podUID=8468013a-35fe-4495-942c-46dd66936e3b Oct 2 19:09:49.997501 kubelet[2094]: E1002 19:09:49.995311 2094 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:09:49.997501 kubelet[2094]: E1002 19:09:49.995350 2094 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3} Oct 2 19:09:49.997501 kubelet[2094]: E1002 19:09:49.995399 2094 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dc11dcf6-6adf-4367-95d8-eb8f31460f7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:49.997501 kubelet[2094]: E1002 19:09:49.995455 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dc11dcf6-6adf-4367-95d8-eb8f31460f7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-wsv26" podUID=dc11dcf6-6adf-4367-95d8-eb8f31460f7c Oct 2 19:09:49.997690 kubelet[2094]: E1002 19:09:49.996888 2094 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:09:49.997690 kubelet[2094]: E1002 19:09:49.996918 2094 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a} Oct 2 19:09:49.997690 kubelet[2094]: E1002 19:09:49.996968 2094 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fb77709d-d2cd-400a-a395-69f5f0b19a47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:49.997690 kubelet[2094]: E1002 19:09:49.997160 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fb77709d-d2cd-400a-a395-69f5f0b19a47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:09:54.919489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3480380997.mount: Deactivated successfully. Oct 2 19:09:54.970605 env[1141]: time="2023-10-02T19:09:54.970542182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:54.973292 env[1141]: time="2023-10-02T19:09:54.973248042Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:54.975403 env[1141]: time="2023-10-02T19:09:54.975364705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:54.977258 env[1141]: time="2023-10-02T19:09:54.977221985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:54.977907 env[1141]: time="2023-10-02T19:09:54.977867930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:09:54.982700 env[1141]: time="2023-10-02T19:09:54.982649129Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:09:54.998608 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3536203445.mount: Deactivated successfully. Oct 2 19:09:55.010140 env[1141]: time="2023-10-02T19:09:55.010076776Z" level=info msg="CreateContainer within sandbox \"ac1922654961ed9301b11834e62dfa030d455bfec670c91cebefdfa71faf65b4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84\"" Oct 2 19:09:55.012745 env[1141]: time="2023-10-02T19:09:55.010930362Z" level=info msg="StartContainer for \"0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84\"" Oct 2 19:09:55.039270 systemd[1]: Started cri-containerd-0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84.scope. Oct 2 19:09:55.092267 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:09:55.092460 kernel: audit: type=1400 audit(1696273795.065:1177): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.124267 kernel: audit: type=1300 audit(1696273795.065:1177): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2523 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.065000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2523 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.153470 kernel: audit: type=1327 audit(1696273795.065:1177): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306132643363346566326137633966363231366461616330336535 Oct 2 19:09:55.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306132643363346566326137633966363231366461616330336535 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.195241 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.195374 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.216251 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.237824 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.261023 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.262155 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.266255 env[1141]: time="2023-10-02T19:09:55.266202664Z" level=info msg="StartContainer for \"0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84\" returns successfully" Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.065000 audit: BPF prog-id=151 op=LOAD Oct 2 19:09:55.065000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030cc30 items=0 ppid=2523 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306132643363346566326137633966363231366461616330336535 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit: BPF prog-id=152 op=LOAD Oct 2 19:09:55.091000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030cc78 items=0 ppid=2523 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306132643363346566326137633966363231366461616330336535 Oct 2 19:09:55.091000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:09:55.305013 kernel: audit: type=1400 audit(1696273795.065:1178): avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:55.091000 audit: BPF prog-id=153 op=LOAD Oct 2 19:09:55.091000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030cd08 items=0 ppid=2523 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062306132643363346566326137633966363231366461616330336535 Oct 2 19:09:55.371479 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:09:55.371666 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:09:55.932208 kubelet[2094]: I1002 19:09:55.931950 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-r24wf" podStartSLOduration=2.985840202 podCreationTimestamp="2023-10-02 19:09:37 +0000 UTC" firstStartedPulling="2023-10-02 19:09:39.032308817 +0000 UTC m=+22.576464103" lastFinishedPulling="2023-10-02 19:09:54.978357985 +0000 UTC m=+38.522513270" observedRunningTime="2023-10-02 19:09:55.929196338 +0000 UTC m=+39.473351633" watchObservedRunningTime="2023-10-02 19:09:55.931889369 +0000 UTC m=+39.476044664" Oct 2 19:09:56.798000 audit[3138]: AVC avc: denied { write } for pid=3138 comm="tee" name="fd" dev="proc" ino=24155 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.798000 audit[3138]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd88e392b a2=241 a3=1b6 items=1 ppid=3105 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.798000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:09:56.798000 audit: PATH item=0 name="/dev/fd/63" inode=24147 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.829000 audit[3150]: AVC avc: denied { write } for pid=3150 comm="tee" name="fd" dev="proc" ino=24584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.829000 audit[3150]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3c3a491a a2=241 a3=1b6 items=1 ppid=3101 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.829000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:09:56.829000 audit: PATH item=0 name="/dev/fd/63" inode=24159 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.831000 audit[3156]: AVC avc: denied { write } for pid=3156 comm="tee" name="fd" dev="proc" ino=24588 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.831000 audit[3156]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc60622929 a2=241 a3=1b6 items=1 ppid=3103 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.831000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:09:56.831000 audit: PATH item=0 name="/dev/fd/63" inode=24164 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.850000 audit[3159]: AVC avc: denied { write } for pid=3159 comm="tee" name="fd" dev="proc" ino=24182 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.850000 audit[3159]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb6dc8929 a2=241 a3=1b6 items=1 ppid=3113 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.858000 audit[3173]: AVC avc: denied { write } for pid=3173 comm="tee" name="fd" dev="proc" ino=24189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.865000 audit[3165]: AVC avc: denied { write } for pid=3165 comm="tee" name="fd" dev="proc" ino=24192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.865000 audit[3165]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf82c992a a2=241 a3=1b6 items=1 ppid=3106 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.865000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:09:56.865000 audit: PATH item=0 name="/dev/fd/63" inode=24175 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.865000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.850000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:09:56.850000 audit: PATH item=0 name="/dev/fd/63" inode=24169 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.850000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.858000 audit[3173]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0b646919 a2=241 a3=1b6 items=1 ppid=3109 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.858000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:09:56.858000 audit: PATH item=0 name="/dev/fd/63" inode=24179 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.858000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:56.910000 audit[3178]: AVC avc: denied { write } for pid=3178 comm="tee" name="fd" dev="proc" ino=24197 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:56.910000 audit[3178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5b72d929 a2=241 a3=1b6 items=1 ppid=3118 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:56.910000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:09:56.910000 audit: PATH item=0 name="/dev/fd/63" inode=24186 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:56.910000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.506000 audit: BPF prog-id=154 op=LOAD Oct 2 19:09:57.506000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf09cd170 a2=70 a3=7f0e0aa90000 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.508000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.508000 audit: BPF prog-id=155 op=LOAD Oct 2 19:09:57.508000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf09cd170 a2=70 a3=6e items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.509000 audit: BPF prog-id=155 op=UNLOAD Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf09cd120 a2=70 a3=7ffdf09cd170 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.509000 audit: BPF prog-id=156 op=LOAD Oct 2 19:09:57.509000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf09cd100 a2=70 a3=7ffdf09cd170 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.509000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.510000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:09:57.510000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.510000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf09cd1e0 a2=70 a3=0 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.510000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.510000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.510000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf09cd1d0 a2=70 a3=0 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.510000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.510000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.510000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdf09cd210 a2=70 a3=0 items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.510000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { perfmon } for pid=3264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit[3264]: AVC avc: denied { bpf } for pid=3264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.511000 audit: BPF prog-id=157 op=LOAD Oct 2 19:09:57.511000 audit[3264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf09cd130 a2=70 a3=ffffffff items=0 ppid=3104 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.511000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:57.519000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.519000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7c613f60 a2=70 a3=fff80800 items=0 ppid=3104 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:57.519000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:57.519000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7c613e30 a2=70 a3=3 items=0 ppid=3104 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.519000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:57.532000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:09:57.630000 audit[3291]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:57.630000 audit[3291]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd8b90c210 a2=0 a3=7ffd8b90c1fc items=0 ppid=3104 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.630000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:57.636000 audit[3292]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:57.636000 audit[3292]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffde6fb29b0 a2=0 a3=55cb70d82000 items=0 ppid=3104 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:57.638000 audit[3293]: NETFILTER_CFG table=mangle:99 family=2 entries=19 op=nft_register_chain pid=3293 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:57.638000 audit[3293]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe1ac1c800 a2=0 a3=7ffe1ac1c7ec items=0 ppid=3104 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.638000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:57.644000 audit[3295]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:57.644000 audit[3295]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffeda75ad40 a2=0 a3=561ae2752000 items=0 ppid=3104 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.644000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:58.377203 systemd-networkd[1023]: vxlan.calico: Link UP Oct 2 19:09:58.377218 systemd-networkd[1023]: vxlan.calico: Gained carrier Oct 2 19:09:58.931900 systemd[1]: run-containerd-runc-k8s.io-0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84-runc.LKZTYr.mount: Deactivated successfully. Oct 2 19:09:59.569246 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Oct 2 19:10:00.737288 env[1141]: time="2023-10-02T19:10:00.737227197Z" level=info msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.794 [INFO][3361] k8s.go 576: Cleaning up netns ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.794 [INFO][3361] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" iface="eth0" netns="/var/run/netns/cni-5c7c676e-dad3-69ae-1bfb-183e9f0ae425" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.795 [INFO][3361] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" iface="eth0" netns="/var/run/netns/cni-5c7c676e-dad3-69ae-1bfb-183e9f0ae425" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.795 [INFO][3361] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" iface="eth0" netns="/var/run/netns/cni-5c7c676e-dad3-69ae-1bfb-183e9f0ae425" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.795 [INFO][3361] k8s.go 583: Releasing IP address(es) ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.795 [INFO][3361] utils.go 196: Calico CNI releasing IP address ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.823 [INFO][3367] ipam_plugin.go 416: Releasing address using handleID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:00.836221 env[1141]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:00.836221 env[1141]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.831 [WARNING][3367] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.832 [INFO][3367] ipam_plugin.go 444: Releasing address using workloadID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:00.836221 env[1141]: time="2023-10-02T19:10:00Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:00.836221 env[1141]: 2023-10-02 19:10:00.834 [INFO][3361] k8s.go 589: Teardown processing complete. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:00.839204 systemd[1]: run-netns-cni\x2d5c7c676e\x2ddad3\x2d69ae\x2d1bfb\x2d183e9f0ae425.mount: Deactivated successfully. Oct 2 19:10:00.840682 env[1141]: time="2023-10-02T19:10:00.840627126Z" level=info msg="TearDown network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" successfully" Oct 2 19:10:00.840782 env[1141]: time="2023-10-02T19:10:00.840681276Z" level=info msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" returns successfully" Oct 2 19:10:00.841804 env[1141]: time="2023-10-02T19:10:00.841750333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wsv26,Uid:dc11dcf6-6adf-4367-95d8-eb8f31460f7c,Namespace:kube-system,Attempt:1,}" Oct 2 19:10:01.027055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:10:01.027226 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec6e70f131a: link becomes ready Oct 2 19:10:01.035332 systemd-networkd[1023]: caliec6e70f131a: Link UP Oct 2 19:10:01.035351 systemd-networkd[1023]: caliec6e70f131a: Gained carrier Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.904 [INFO][3373] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0 coredns-5d78c9869d- kube-system dc11dcf6-6adf-4367-95d8-eb8f31460f7c 693 0 2023-10-02 19:09:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal coredns-5d78c9869d-wsv26 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliec6e70f131a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.904 [INFO][3373] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.961 [INFO][3386] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" HandleID="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.975 [INFO][3386] ipam_plugin.go 269: Auto assigning IP ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" HandleID="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010c3e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-wsv26", "timestamp":"2023-10-02 19:10:00.961312845 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:01.059736 env[1141]: time="2023-10-02T19:10:00Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:01.059736 env[1141]: time="2023-10-02T19:10:00Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.975 [INFO][3386] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.977 [INFO][3386] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.983 [INFO][3386] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.988 [INFO][3386] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.990 [INFO][3386] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.993 [INFO][3386] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.993 [INFO][3386] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.995 [INFO][3386] ipam.go 1682: Creating new handle: k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:00.999 [INFO][3386] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:01.008 [INFO][3386] ipam.go 1216: Successfully claimed IPs: [192.168.21.1/26] block=192.168.21.0/26 handle="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:01.008 [INFO][3386] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.1/26] handle="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:01.059736 env[1141]: time="2023-10-02T19:10:01Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:01.059736 env[1141]: 2023-10-02 19:10:01.008 [INFO][3386] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.1/26] IPv6=[] ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" HandleID="k8s-pod-network.3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.011 [INFO][3373] k8s.go 383: Populated endpoint ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"dc11dcf6-6adf-4367-95d8-eb8f31460f7c", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-wsv26", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec6e70f131a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.011 [INFO][3373] k8s.go 384: Calico CNI using IPs: [192.168.21.1/32] ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.011 [INFO][3373] dataplane_linux.go 68: Setting the host side veth name to caliec6e70f131a ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.028 [INFO][3373] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.046 [INFO][3373] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"dc11dcf6-6adf-4367-95d8-eb8f31460f7c", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab", Pod:"coredns-5d78c9869d-wsv26", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec6e70f131a", MAC:"56:6f:29:63:0b:3e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:01.060992 env[1141]: 2023-10-02 19:10:01.057 [INFO][3373] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab" Namespace="kube-system" Pod="coredns-5d78c9869d-wsv26" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:01.082886 env[1141]: time="2023-10-02T19:10:01.082798652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:01.083055 env[1141]: time="2023-10-02T19:10:01.082907421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:01.083055 env[1141]: time="2023-10-02T19:10:01.082945873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:01.083563 env[1141]: time="2023-10-02T19:10:01.083279255Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab pid=3410 runtime=io.containerd.runc.v2 Oct 2 19:10:01.142543 systemd[1]: Started cri-containerd-3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab.scope. Oct 2 19:10:01.199579 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:10:01.199743 kernel: audit: type=1400 audit(1696273801.171:1208): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.221101 kernel: audit: type=1400 audit(1696273801.172:1209): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.263385 kernel: audit: type=1400 audit(1696273801.172:1210): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.263536 kernel: audit: type=1400 audit(1696273801.172:1211): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284840 kernel: audit: type=1400 audit(1696273801.172:1212): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.308767 kernel: audit: type=1400 audit(1696273801.172:1213): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.331220 kernel: audit: type=1400 audit(1696273801.172:1214): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.353108 kernel: audit: type=1400 audit(1696273801.172:1215): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.374113 kernel: audit: type=1400 audit(1696273801.172:1216): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.395273 kernel: audit: type=1400 audit(1696273801.172:1217): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.172000 audit: BPF prog-id=158 op=LOAD Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3410 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363763363037633962363263633431363432343634633633623131 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3410 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363763363037633962363263633431363432343634633633623131 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.226000 audit[3441]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:01.226000 audit[3441]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd0a2c25f0 a2=0 a3=7ffd0a2c25dc items=0 ppid=3104 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:01.199000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.199000 audit: BPF prog-id=159 op=LOAD Oct 2 19:10:01.199000 audit[3421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f8f90 items=0 ppid=3410 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363763363037633962363263633431363432343634633633623131 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.284000 audit: BPF prog-id=160 op=LOAD Oct 2 19:10:01.284000 audit[3421]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002f8fd8 items=0 ppid=3410 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363763363037633962363263633431363432343634633633623131 Oct 2 19:10:01.358000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:10:01.358000 audit: BPF prog-id=159 op=UNLOAD Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.358000 audit: BPF prog-id=161 op=LOAD Oct 2 19:10:01.358000 audit[3421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f93e8 items=0 ppid=3410 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363763363037633962363263633431363432343634633633623131 Oct 2 19:10:01.457118 env[1141]: time="2023-10-02T19:10:01.457044412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-wsv26,Uid:dc11dcf6-6adf-4367-95d8-eb8f31460f7c,Namespace:kube-system,Attempt:1,} returns sandbox id \"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab\"" Oct 2 19:10:01.462379 env[1141]: time="2023-10-02T19:10:01.462327819Z" level=info msg="CreateContainer within sandbox \"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:10:01.480898 env[1141]: time="2023-10-02T19:10:01.480834597Z" level=info msg="CreateContainer within sandbox \"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f10705e785c24eca4d010441ca4a380afb578c16587bf419aa71a0fca369d45e\"" Oct 2 19:10:01.481891 env[1141]: time="2023-10-02T19:10:01.481841816Z" level=info msg="StartContainer for \"f10705e785c24eca4d010441ca4a380afb578c16587bf419aa71a0fca369d45e\"" Oct 2 19:10:01.509862 systemd[1]: Started cri-containerd-f10705e785c24eca4d010441ca4a380afb578c16587bf419aa71a0fca369d45e.scope. Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.535000 audit: BPF prog-id=162 op=LOAD Oct 2 19:10:01.537000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.537000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303730356537383563323465636134643031303434316361346133 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303730356537383563323465636134643031303434316361346133 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.538000 audit: BPF prog-id=163 op=LOAD Oct 2 19:10:01.538000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000266f90 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303730356537383563323465636134643031303434316361346133 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.540000 audit: BPF prog-id=164 op=LOAD Oct 2 19:10:01.540000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000266fd8 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303730356537383563323465636134643031303434316361346133 Oct 2 19:10:01.541000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:10:01.541000 audit: BPF prog-id=163 op=UNLOAD Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:01.541000 audit: BPF prog-id=165 op=LOAD Oct 2 19:10:01.541000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0002673e8 items=0 ppid=3410 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631303730356537383563323465636134643031303434316361346133 Oct 2 19:10:01.563920 env[1141]: time="2023-10-02T19:10:01.563755569Z" level=info msg="StartContainer for \"f10705e785c24eca4d010441ca4a380afb578c16587bf419aa71a0fca369d45e\" returns successfully" Oct 2 19:10:01.737223 env[1141]: time="2023-10-02T19:10:01.737132535Z" level=info msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" Oct 2 19:10:01.840848 systemd[1]: run-containerd-runc-k8s.io-3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab-runc.x4fxv3.mount: Deactivated successfully. Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.794 [INFO][3507] k8s.go 576: Cleaning up netns ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.795 [INFO][3507] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" iface="eth0" netns="/var/run/netns/cni-2f1e03c7-6843-707f-45ad-4aa3d3c73f22" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.795 [INFO][3507] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" iface="eth0" netns="/var/run/netns/cni-2f1e03c7-6843-707f-45ad-4aa3d3c73f22" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.795 [INFO][3507] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" iface="eth0" netns="/var/run/netns/cni-2f1e03c7-6843-707f-45ad-4aa3d3c73f22" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.795 [INFO][3507] k8s.go 583: Releasing IP address(es) ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.795 [INFO][3507] utils.go 196: Calico CNI releasing IP address ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.825 [INFO][3513] ipam_plugin.go 416: Releasing address using handleID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:01.845910 env[1141]: time="2023-10-02T19:10:01Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:01.845910 env[1141]: time="2023-10-02T19:10:01Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.834 [WARNING][3513] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.834 [INFO][3513] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:01.845910 env[1141]: time="2023-10-02T19:10:01Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:01.845910 env[1141]: 2023-10-02 19:10:01.844 [INFO][3507] k8s.go 589: Teardown processing complete. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:01.850680 env[1141]: time="2023-10-02T19:10:01.849192928Z" level=info msg="TearDown network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" successfully" Oct 2 19:10:01.850680 env[1141]: time="2023-10-02T19:10:01.849239322Z" level=info msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" returns successfully" Oct 2 19:10:01.848842 systemd[1]: run-netns-cni\x2d2f1e03c7\x2d6843\x2d707f\x2d45ad\x2d4aa3d3c73f22.mount: Deactivated successfully. Oct 2 19:10:01.850932 env[1141]: time="2023-10-02T19:10:01.850724008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-h4dlx,Uid:2faa1229-d753-4b8a-a619-ef2ad245108c,Namespace:calico-system,Attempt:1,}" Oct 2 19:10:01.939614 kubelet[2094]: I1002 19:10:01.939567 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-wsv26" podStartSLOduration=30.939516646 podCreationTimestamp="2023-10-02 19:09:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:10:01.939156884 +0000 UTC m=+45.483312181" watchObservedRunningTime="2023-10-02 19:10:01.939516646 +0000 UTC m=+45.483671944" Oct 2 19:10:01.981000 audit[3536]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:01.981000 audit[3536]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc972d55f0 a2=0 a3=7ffc972d55dc items=0 ppid=2237 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:01.983000 audit[3536]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:01.983000 audit[3536]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc972d55f0 a2=0 a3=31030 items=0 ppid=2237 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:01.999000 audit[3538]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:01.999000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe7a3c1710 a2=0 a3=7ffe7a3c16fc items=0 ppid=2237 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:01.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:02.009000 audit[3538]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:02.009000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe7a3c1710 a2=0 a3=7ffe7a3c16fc items=0 ppid=2237 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:02.068234 systemd-networkd[1023]: califcd20006314: Link UP Oct 2 19:10:02.073077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califcd20006314: link becomes ready Oct 2 19:10:02.073452 systemd-networkd[1023]: califcd20006314: Gained carrier Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:01.920 [INFO][3519] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0 calico-kube-controllers-7bd445fdb4- calico-system 2faa1229-d753-4b8a-a619-ef2ad245108c 705 0 2023-10-02 19:09:37 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal calico-kube-controllers-7bd445fdb4-h4dlx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califcd20006314 [] []}} ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:01.920 [INFO][3519] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.013 [INFO][3531] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" HandleID="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.026 [INFO][3531] ipam_plugin.go 269: Auto assigning IP ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" HandleID="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000534890), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"calico-kube-controllers-7bd445fdb4-h4dlx", "timestamp":"2023-10-02 19:10:02.013349313 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:02.101395 env[1141]: time="2023-10-02T19:10:02Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:02.101395 env[1141]: time="2023-10-02T19:10:02Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.026 [INFO][3531] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.028 [INFO][3531] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.032 [INFO][3531] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.036 [INFO][3531] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.038 [INFO][3531] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.042 [INFO][3531] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.042 [INFO][3531] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.043 [INFO][3531] ipam.go 1682: Creating new handle: k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437 Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.047 [INFO][3531] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.054 [INFO][3531] ipam.go 1216: Successfully claimed IPs: [192.168.21.2/26] block=192.168.21.0/26 handle="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.054 [INFO][3531] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.2/26] handle="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:02.101395 env[1141]: time="2023-10-02T19:10:02Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:02.101395 env[1141]: 2023-10-02 19:10:02.054 [INFO][3531] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.2/26] IPv6=[] ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" HandleID="k8s-pod-network.37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.056 [INFO][3519] k8s.go 383: Populated endpoint ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2faa1229-d753-4b8a-a619-ef2ad245108c", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-h4dlx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califcd20006314", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.056 [INFO][3519] k8s.go 384: Calico CNI using IPs: [192.168.21.2/32] ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.056 [INFO][3519] dataplane_linux.go 68: Setting the host side veth name to califcd20006314 ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.057 [INFO][3519] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.075 [INFO][3519] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2faa1229-d753-4b8a-a619-ef2ad245108c", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437", Pod:"calico-kube-controllers-7bd445fdb4-h4dlx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califcd20006314", MAC:"2e:86:20:4b:2a:64", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:02.102648 env[1141]: 2023-10-02 19:10:02.097 [INFO][3519] k8s.go 489: Wrote updated endpoint to datastore ContainerID="37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-h4dlx" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:02.134108 env[1141]: time="2023-10-02T19:10:02.133794371Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:02.134108 env[1141]: time="2023-10-02T19:10:02.133848365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:02.134108 env[1141]: time="2023-10-02T19:10:02.133885113Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:02.134496 env[1141]: time="2023-10-02T19:10:02.134170762Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437 pid=3564 runtime=io.containerd.runc.v2 Oct 2 19:10:02.163505 systemd[1]: Started cri-containerd-37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437.scope. Oct 2 19:10:02.188000 audit[3593]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3593 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:02.188000 audit[3593]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffc09310400 a2=0 a3=7ffc093103ec items=0 ppid=3104 pid=3593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.188000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.194000 audit: BPF prog-id=166 op=LOAD Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636335326435356236366634383037343739336364363964316634 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636335326435356236366634383037343739336364363964316634 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit: BPF prog-id=167 op=LOAD Oct 2 19:10:02.195000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000313a50 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636335326435356236366634383037343739336364363964316634 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit: BPF prog-id=168 op=LOAD Oct 2 19:10:02.195000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000313a98 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636335326435356236366634383037343739336364363964316634 Oct 2 19:10:02.195000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:10:02.195000 audit: BPF prog-id=167 op=UNLOAD Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:02.195000 audit: BPF prog-id=169 op=LOAD Oct 2 19:10:02.195000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000313ea8 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636335326435356236366634383037343739336364363964316634 Oct 2 19:10:02.241086 env[1141]: time="2023-10-02T19:10:02.241029276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-h4dlx,Uid:2faa1229-d753-4b8a-a619-ef2ad245108c,Namespace:calico-system,Attempt:1,} returns sandbox id \"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437\"" Oct 2 19:10:02.244281 env[1141]: time="2023-10-02T19:10:02.244237192Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:10:02.449411 systemd-networkd[1023]: caliec6e70f131a: Gained IPv6LL Oct 2 19:10:03.209810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2313479336.mount: Deactivated successfully. Oct 2 19:10:03.665672 systemd-networkd[1023]: califcd20006314: Gained IPv6LL Oct 2 19:10:03.737125 env[1141]: time="2023-10-02T19:10:03.737063243Z" level=info msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.801 [INFO][3621] k8s.go 576: Cleaning up netns ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.802 [INFO][3621] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" iface="eth0" netns="/var/run/netns/cni-a6fd6935-658f-7905-6844-ce95307b7942" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.802 [INFO][3621] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" iface="eth0" netns="/var/run/netns/cni-a6fd6935-658f-7905-6844-ce95307b7942" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.803 [INFO][3621] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" iface="eth0" netns="/var/run/netns/cni-a6fd6935-658f-7905-6844-ce95307b7942" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.803 [INFO][3621] k8s.go 583: Releasing IP address(es) ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.803 [INFO][3621] utils.go 196: Calico CNI releasing IP address ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.854 [INFO][3627] ipam_plugin.go 416: Releasing address using handleID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:03.874555 env[1141]: time="2023-10-02T19:10:03Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:03.874555 env[1141]: time="2023-10-02T19:10:03Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.866 [WARNING][3627] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.866 [INFO][3627] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:03.874555 env[1141]: time="2023-10-02T19:10:03Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:03.874555 env[1141]: 2023-10-02 19:10:03.872 [INFO][3621] k8s.go 589: Teardown processing complete. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:03.878564 env[1141]: time="2023-10-02T19:10:03.878488796Z" level=info msg="TearDown network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" successfully" Oct 2 19:10:03.878772 env[1141]: time="2023-10-02T19:10:03.878743719Z" level=info msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" returns successfully" Oct 2 19:10:03.880220 env[1141]: time="2023-10-02T19:10:03.880172085Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvsnl,Uid:8468013a-35fe-4495-942c-46dd66936e3b,Namespace:kube-system,Attempt:1,}" Oct 2 19:10:03.881096 systemd[1]: run-netns-cni\x2da6fd6935\x2d658f\x2d7905\x2d6844\x2dce95307b7942.mount: Deactivated successfully. Oct 2 19:10:04.112562 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:10:04.112822 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali009103d822d: link becomes ready Oct 2 19:10:04.118797 systemd-networkd[1023]: cali009103d822d: Link UP Oct 2 19:10:04.118809 systemd-networkd[1023]: cali009103d822d: Gained carrier Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:03.986 [INFO][3634] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0 coredns-5d78c9869d- kube-system 8468013a-35fe-4495-942c-46dd66936e3b 722 0 2023-10-02 19:09:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal coredns-5d78c9869d-gvsnl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali009103d822d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:03.987 [INFO][3634] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.038 [INFO][3645] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" HandleID="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.055 [INFO][3645] ipam_plugin.go 269: Auto assigning IP ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" HandleID="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000129090), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-gvsnl", "timestamp":"2023-10-02 19:10:04.038661605 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:04.136582 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:04.136582 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.055 [INFO][3645] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.059 [INFO][3645] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.065 [INFO][3645] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.071 [INFO][3645] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.073 [INFO][3645] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.076 [INFO][3645] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.077 [INFO][3645] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.079 [INFO][3645] ipam.go 1682: Creating new handle: k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0 Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.085 [INFO][3645] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.094 [INFO][3645] ipam.go 1216: Successfully claimed IPs: [192.168.21.3/26] block=192.168.21.0/26 handle="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.094 [INFO][3645] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.3/26] handle="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:04.136582 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:04.136582 env[1141]: 2023-10-02 19:10:04.094 [INFO][3645] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.3/26] IPv6=[] ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" HandleID="k8s-pod-network.341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.096 [INFO][3634] k8s.go 383: Populated endpoint ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8468013a-35fe-4495-942c-46dd66936e3b", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-gvsnl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali009103d822d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.096 [INFO][3634] k8s.go 384: Calico CNI using IPs: [192.168.21.3/32] ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.096 [INFO][3634] dataplane_linux.go 68: Setting the host side veth name to cali009103d822d ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.113 [INFO][3634] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.119 [INFO][3634] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8468013a-35fe-4495-942c-46dd66936e3b", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0", Pod:"coredns-5d78c9869d-gvsnl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali009103d822d", MAC:"de:4e:72:31:fb:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:04.139651 env[1141]: 2023-10-02 19:10:04.134 [INFO][3634] k8s.go 489: Wrote updated endpoint to datastore ContainerID="341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0" Namespace="kube-system" Pod="coredns-5d78c9869d-gvsnl" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:04.187000 audit[3672]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3672 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:04.191681 env[1141]: time="2023-10-02T19:10:04.191581921Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:04.191891 env[1141]: time="2023-10-02T19:10:04.191698610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:04.191891 env[1141]: time="2023-10-02T19:10:04.191738026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:04.192089 env[1141]: time="2023-10-02T19:10:04.191938502Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0 pid=3668 runtime=io.containerd.runc.v2 Oct 2 19:10:04.187000 audit[3672]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7ffea22fa890 a2=0 a3=7ffea22fa87c items=0 ppid=3104 pid=3672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.187000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:04.232639 systemd[1]: Started cri-containerd-341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0.scope. Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.273000 audit: BPF prog-id=170 op=LOAD Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316234616163393839383936303530313761306261623461393537 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316234616163393839383936303530313761306261623461393537 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit: BPF prog-id=171 op=LOAD Oct 2 19:10:04.274000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024660 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316234616163393839383936303530313761306261623461393537 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit: BPF prog-id=172 op=LOAD Oct 2 19:10:04.274000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000246a8 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316234616163393839383936303530313761306261623461393537 Oct 2 19:10:04.274000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:10:04.274000 audit: BPF prog-id=171 op=UNLOAD Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.274000 audit: BPF prog-id=173 op=LOAD Oct 2 19:10:04.274000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024ab8 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316234616163393839383936303530313761306261623461393537 Oct 2 19:10:04.340501 env[1141]: time="2023-10-02T19:10:04.340443648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gvsnl,Uid:8468013a-35fe-4495-942c-46dd66936e3b,Namespace:kube-system,Attempt:1,} returns sandbox id \"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0\"" Oct 2 19:10:04.346754 env[1141]: time="2023-10-02T19:10:04.346703844Z" level=info msg="CreateContainer within sandbox \"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:10:04.381094 env[1141]: time="2023-10-02T19:10:04.380857902Z" level=info msg="CreateContainer within sandbox \"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"36a49a288c684b61e43c46d34efe8ecd1fcde21a55fe66d31310a3f26761c7b9\"" Oct 2 19:10:04.389654 env[1141]: time="2023-10-02T19:10:04.389595927Z" level=info msg="StartContainer for \"36a49a288c684b61e43c46d34efe8ecd1fcde21a55fe66d31310a3f26761c7b9\"" Oct 2 19:10:04.433915 systemd[1]: Started cri-containerd-36a49a288c684b61e43c46d34efe8ecd1fcde21a55fe66d31310a3f26761c7b9.scope. Oct 2 19:10:04.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.468000 audit: BPF prog-id=174 op=LOAD Oct 2 19:10:04.469000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.469000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=3668 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613439613238386336383462363165343363343664333465666538 Oct 2 19:10:04.469000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.469000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=3668 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613439613238386336383462363165343363343664333465666538 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.470000 audit: BPF prog-id=175 op=LOAD Oct 2 19:10:04.470000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024630 items=0 ppid=3668 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613439613238386336383462363165343363343664333465666538 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.471000 audit: BPF prog-id=176 op=LOAD Oct 2 19:10:04.471000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000024678 items=0 ppid=3668 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613439613238386336383462363165343363343664333465666538 Oct 2 19:10:04.472000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:10:04.472000 audit: BPF prog-id=175 op=UNLOAD Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:04.472000 audit: BPF prog-id=177 op=LOAD Oct 2 19:10:04.472000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000024a88 items=0 ppid=3668 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:04.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613439613238386336383462363165343363343664333465666538 Oct 2 19:10:04.511011 env[1141]: time="2023-10-02T19:10:04.507207581Z" level=info msg="StartContainer for \"36a49a288c684b61e43c46d34efe8ecd1fcde21a55fe66d31310a3f26761c7b9\" returns successfully" Oct 2 19:10:04.743134 env[1141]: time="2023-10-02T19:10:04.742832158Z" level=info msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.844 [INFO][3762] k8s.go 576: Cleaning up netns ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.844 [INFO][3762] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" iface="eth0" netns="/var/run/netns/cni-5faff820-8469-f9bb-5185-cb6ca22d3462" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.845 [INFO][3762] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" iface="eth0" netns="/var/run/netns/cni-5faff820-8469-f9bb-5185-cb6ca22d3462" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.845 [INFO][3762] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" iface="eth0" netns="/var/run/netns/cni-5faff820-8469-f9bb-5185-cb6ca22d3462" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.845 [INFO][3762] k8s.go 583: Releasing IP address(es) ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.845 [INFO][3762] utils.go 196: Calico CNI releasing IP address ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.906 [INFO][3768] ipam_plugin.go 416: Releasing address using handleID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:04.922579 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:04.922579 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.916 [WARNING][3768] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.916 [INFO][3768] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:04.922579 env[1141]: time="2023-10-02T19:10:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:04.922579 env[1141]: 2023-10-02 19:10:04.920 [INFO][3762] k8s.go 589: Teardown processing complete. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:04.926659 systemd[1]: run-netns-cni\x2d5faff820\x2d8469\x2df9bb\x2d5185\x2dcb6ca22d3462.mount: Deactivated successfully. Oct 2 19:10:04.927392 env[1141]: time="2023-10-02T19:10:04.927326157Z" level=info msg="TearDown network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" successfully" Oct 2 19:10:04.927586 env[1141]: time="2023-10-02T19:10:04.927555606Z" level=info msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" returns successfully" Oct 2 19:10:04.931915 env[1141]: time="2023-10-02T19:10:04.931778052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bgqn6,Uid:fb77709d-d2cd-400a-a395-69f5f0b19a47,Namespace:calico-system,Attempt:1,}" Oct 2 19:10:04.969767 kubelet[2094]: I1002 19:10:04.969725 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gvsnl" podStartSLOduration=33.969658234 podCreationTimestamp="2023-10-02 19:09:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:10:04.963297644 +0000 UTC m=+48.507452939" watchObservedRunningTime="2023-10-02 19:10:04.969658234 +0000 UTC m=+48.513813529" Oct 2 19:10:05.061000 audit[3780]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:05.061000 audit[3780]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff2a0783f0 a2=0 a3=7fff2a0783dc items=0 ppid=2237 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:05.064000 audit[3780]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:05.064000 audit[3780]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff2a0783f0 a2=0 a3=7fff2a0783dc items=0 ppid=2237 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:05.298000 audit[3788]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:05.298000 audit[3788]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd36ab3f20 a2=0 a3=7ffd36ab3f0c items=0 ppid=2237 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:05.341000 audit[3788]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:05.341000 audit[3788]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd36ab3f20 a2=0 a3=7ffd36ab3f0c items=0 ppid=2237 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:05.400593 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:10:05.400744 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab8084ea1b5: link becomes ready Oct 2 19:10:05.408590 systemd-networkd[1023]: caliab8084ea1b5: Link UP Oct 2 19:10:05.408603 systemd-networkd[1023]: caliab8084ea1b5: Gained carrier Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.157 [INFO][3775] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0 csi-node-driver- calico-system fb77709d-d2cd-400a-a395-69f5f0b19a47 733 0 2023-10-02 19:09:48 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal csi-node-driver-bgqn6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliab8084ea1b5 [] []}} ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.157 [INFO][3775] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.283 [INFO][3790] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" HandleID="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.318 [INFO][3790] ipam_plugin.go 269: Auto assigning IP ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" HandleID="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"csi-node-driver-bgqn6", "timestamp":"2023-10-02 19:10:05.283269395 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:05.448109 env[1141]: time="2023-10-02T19:10:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:05.448109 env[1141]: time="2023-10-02T19:10:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.318 [INFO][3790] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.335 [INFO][3790] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.347 [INFO][3790] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.356 [INFO][3790] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.359 [INFO][3790] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.363 [INFO][3790] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.363 [INFO][3790] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.366 [INFO][3790] ipam.go 1682: Creating new handle: k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8 Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.373 [INFO][3790] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.379 [INFO][3790] ipam.go 1216: Successfully claimed IPs: [192.168.21.4/26] block=192.168.21.0/26 handle="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.379 [INFO][3790] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.4/26] handle="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:05.448109 env[1141]: time="2023-10-02T19:10:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:05.448109 env[1141]: 2023-10-02 19:10:05.379 [INFO][3790] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.4/26] IPv6=[] ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" HandleID="k8s-pod-network.d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.383 [INFO][3775] k8s.go 383: Populated endpoint ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fb77709d-d2cd-400a-a395-69f5f0b19a47", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-bgqn6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab8084ea1b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.383 [INFO][3775] k8s.go 384: Calico CNI using IPs: [192.168.21.4/32] ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.384 [INFO][3775] dataplane_linux.go 68: Setting the host side veth name to caliab8084ea1b5 ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.401 [INFO][3775] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.412 [INFO][3775] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fb77709d-d2cd-400a-a395-69f5f0b19a47", ResourceVersion:"733", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8", Pod:"csi-node-driver-bgqn6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab8084ea1b5", MAC:"c2:44:73:3c:27:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:05.449363 env[1141]: 2023-10-02 19:10:05.445 [INFO][3775] k8s.go 489: Wrote updated endpoint to datastore ContainerID="d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8" Namespace="calico-system" Pod="csi-node-driver-bgqn6" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:05.481000 audit[3811]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:05.481000 audit[3811]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7fff9c87a7a0 a2=0 a3=7fff9c87a78c items=0 ppid=3104 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:05.504260 env[1141]: time="2023-10-02T19:10:05.504155327Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:05.504260 env[1141]: time="2023-10-02T19:10:05.504215272Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:05.504559 env[1141]: time="2023-10-02T19:10:05.504233762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:05.504559 env[1141]: time="2023-10-02T19:10:05.504410886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8 pid=3819 runtime=io.containerd.runc.v2 Oct 2 19:10:05.548421 systemd[1]: Started cri-containerd-d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8.scope. Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.585000 audit: BPF prog-id=178 op=LOAD Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3819 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336635376432323638646234333631626534343061656537613932 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3819 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336635376432323638646234333631626534343061656537613932 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.587000 audit: BPF prog-id=179 op=LOAD Oct 2 19:10:05.587000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002184f0 items=0 ppid=3819 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336635376432323638646234333631626534343061656537613932 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.589000 audit: BPF prog-id=180 op=LOAD Oct 2 19:10:05.589000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218538 items=0 ppid=3819 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336635376432323638646234333631626534343061656537613932 Oct 2 19:10:05.590000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:10:05.590000 audit: BPF prog-id=179 op=UNLOAD Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.590000 audit: BPF prog-id=181 op=LOAD Oct 2 19:10:05.590000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218948 items=0 ppid=3819 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435336635376432323638646234333631626534343061656537613932 Oct 2 19:10:05.618079 env[1141]: time="2023-10-02T19:10:05.616846239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bgqn6,Uid:fb77709d-d2cd-400a-a395-69f5f0b19a47,Namespace:calico-system,Attempt:1,} returns sandbox id \"d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8\"" Oct 2 19:10:05.720271 env[1141]: time="2023-10-02T19:10:05.720197025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:05.725241 env[1141]: time="2023-10-02T19:10:05.725185447Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:05.728174 env[1141]: time="2023-10-02T19:10:05.728129160Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:05.731336 env[1141]: time="2023-10-02T19:10:05.731287354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:10:05.732754 env[1141]: time="2023-10-02T19:10:05.732713846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:10:05.736853 env[1141]: time="2023-10-02T19:10:05.736814112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:05.738643 env[1141]: time="2023-10-02T19:10:05.738536495Z" level=info msg="CreateContainer within sandbox \"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:10:05.753809 env[1141]: time="2023-10-02T19:10:05.753750858Z" level=info msg="CreateContainer within sandbox \"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704\"" Oct 2 19:10:05.756335 env[1141]: time="2023-10-02T19:10:05.754598658Z" level=info msg="StartContainer for \"2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704\"" Oct 2 19:10:05.780808 systemd[1]: Started cri-containerd-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704.scope. Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.807000 audit: BPF prog-id=182 op=LOAD Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3564 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653432313065653563316562333862626631353563376465353562 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3564 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653432313065653563316562333862626631353563376465353562 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit: BPF prog-id=183 op=LOAD Oct 2 19:10:05.808000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000282370 items=0 ppid=3564 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653432313065653563316562333862626631353563376465353562 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.808000 audit: BPF prog-id=184 op=LOAD Oct 2 19:10:05.808000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002823b8 items=0 ppid=3564 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653432313065653563316562333862626631353563376465353562 Oct 2 19:10:05.809000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:10:05.809000 audit: BPF prog-id=183 op=UNLOAD Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { perfmon } for pid=3866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit[3866]: AVC avc: denied { bpf } for pid=3866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:05.809000 audit: BPF prog-id=185 op=LOAD Oct 2 19:10:05.809000 audit[3866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002827c8 items=0 ppid=3564 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:05.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653432313065653563316562333862626631353563376465353562 Oct 2 19:10:05.846591 env[1141]: time="2023-10-02T19:10:05.846501881Z" level=info msg="StartContainer for \"2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704\" returns successfully" Oct 2 19:10:05.862775 env[1141]: time="2023-10-02T19:10:05.862706018Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:05.864652 env[1141]: time="2023-10-02T19:10:05.864591252Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:05.865715 kubelet[2094]: E1002 19:10:05.865109 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:05.865715 kubelet[2094]: E1002 19:10:05.865162 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:05.865928 kubelet[2094]: E1002 19:10:05.865301 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:05.869369 env[1141]: time="2023-10-02T19:10:05.866753360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:05.985428 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.TfRmGj.mount: Deactivated successfully. Oct 2 19:10:06.015160 env[1141]: time="2023-10-02T19:10:06.015094488Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:06.017060 env[1141]: time="2023-10-02T19:10:06.016953477Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:06.018069 kubelet[2094]: E1002 19:10:06.017528 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:06.018069 kubelet[2094]: E1002 19:10:06.017583 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:06.018069 kubelet[2094]: E1002 19:10:06.017698 2094 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:06.018069 kubelet[2094]: E1002 19:10:06.017772 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:10:06.043358 kubelet[2094]: I1002 19:10:06.042946 2094 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-h4dlx" podStartSLOduration=25.552311868 podCreationTimestamp="2023-10-02 19:09:37 +0000 UTC" firstStartedPulling="2023-10-02 19:10:02.242706676 +0000 UTC m=+45.786861963" lastFinishedPulling="2023-10-02 19:10:05.733287418 +0000 UTC m=+49.277442698" observedRunningTime="2023-10-02 19:10:05.965417681 +0000 UTC m=+49.509572977" watchObservedRunningTime="2023-10-02 19:10:06.042892603 +0000 UTC m=+49.587047898" Oct 2 19:10:06.162283 systemd-networkd[1023]: cali009103d822d: Gained IPv6LL Oct 2 19:10:06.865492 systemd-networkd[1023]: caliab8084ea1b5: Gained IPv6LL Oct 2 19:10:06.954785 kubelet[2094]: E1002 19:10:06.954737 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:10:08.850358 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.qn0ce5.mount: Deactivated successfully. Oct 2 19:10:08.931014 systemd[1]: run-containerd-runc-k8s.io-0b0a2d3c4ef2a7c9f6216daac03e576e9a0e4a4e7c95737450d37722a411bd84-runc.jcblw5.mount: Deactivated successfully. Oct 2 19:10:11.445000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:11.451656 kernel: kauditd_printk_skb: 425 callbacks suppressed Oct 2 19:10:11.451823 kernel: audit: type=1400 audit(1696273811.445:1346): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:11.445000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00190e4e0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:11.552068 kernel: audit: type=1300 audit(1696273811.445:1346): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00190e4e0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:11.552222 kernel: audit: type=1327 audit(1696273811.445:1346): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.445000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.445000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:11.615368 kernel: audit: type=1400 audit(1696273811.445:1347): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:11.615520 kernel: audit: type=1300 audit(1696273811.445:1347): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff99e0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:11.445000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ff99e0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:11.445000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.646022 kernel: audit: type=1327 audit(1696273811.445:1347): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.688620 kubelet[2094]: I1002 19:10:11.688574 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:10:11.698445 systemd[1]: Created slice kubepods-besteffort-podaa9ac9e5_e55b_418e_98f1_7f3bfab478ee.slice. Oct 2 19:10:11.733648 kubelet[2094]: I1002 19:10:11.733604 2094 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:10:11.743282 systemd[1]: Created slice kubepods-besteffort-pod9e7825fe_7e60_4130_a04f_6e2113b445d1.slice. Oct 2 19:10:11.795000 audit[3968]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.795000 audit[3968]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa93ebb10 a2=0 a3=7fffa93ebafc items=0 ppid=2237 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.819269 kubelet[2094]: I1002 19:10:11.819222 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9e7825fe-7e60-4130-a04f-6e2113b445d1-calico-apiserver-certs\") pod \"calico-apiserver-865c8ff979-v86vh\" (UID: \"9e7825fe-7e60-4130-a04f-6e2113b445d1\") " pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" Oct 2 19:10:11.819645 kubelet[2094]: I1002 19:10:11.819614 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmxxs\" (UniqueName: \"kubernetes.io/projected/aa9ac9e5-e55b-418e-98f1-7f3bfab478ee-kube-api-access-hmxxs\") pod \"calico-apiserver-865c8ff979-kd6b5\" (UID: \"aa9ac9e5-e55b-418e-98f1-7f3bfab478ee\") " pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" Oct 2 19:10:11.819827 kubelet[2094]: I1002 19:10:11.819812 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kbkjm\" (UniqueName: \"kubernetes.io/projected/9e7825fe-7e60-4130-a04f-6e2113b445d1-kube-api-access-kbkjm\") pod \"calico-apiserver-865c8ff979-v86vh\" (UID: \"9e7825fe-7e60-4130-a04f-6e2113b445d1\") " pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" Oct 2 19:10:11.820004 kubelet[2094]: I1002 19:10:11.819991 2094 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/aa9ac9e5-e55b-418e-98f1-7f3bfab478ee-calico-apiserver-certs\") pod \"calico-apiserver-865c8ff979-kd6b5\" (UID: \"aa9ac9e5-e55b-418e-98f1-7f3bfab478ee\") " pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" Oct 2 19:10:11.846483 kernel: audit: type=1325 audit(1696273811.795:1348): table=filter:113 family=2 entries=9 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.846670 kernel: audit: type=1300 audit(1696273811.795:1348): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa93ebb10 a2=0 a3=7fffa93ebafc items=0 ppid=2237 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:11.864010 kernel: audit: type=1327 audit(1696273811.795:1348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:11.796000 audit[3968]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.881004 kernel: audit: type=1325 audit(1696273811.796:1349): table=nat:114 family=2 entries=20 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.796000 audit[3968]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffa93ebb10 a2=0 a3=7fffa93ebafc items=0 ppid=2237 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:11.897000 audit[3970]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=3970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.897000 audit[3970]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa6b9ac50 a2=0 a3=7fffa6b9ac3c items=0 ppid=2237 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:11.899000 audit[3970]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=3970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:11.899000 audit[3970]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffa6b9ac50 a2=0 a3=7fffa6b9ac3c items=0 ppid=2237 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:11.921563 kubelet[2094]: E1002 19:10:11.921529 2094 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:10:11.921855 kubelet[2094]: E1002 19:10:11.921833 2094 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/aa9ac9e5-e55b-418e-98f1-7f3bfab478ee-calico-apiserver-certs podName:aa9ac9e5-e55b-418e-98f1-7f3bfab478ee nodeName:}" failed. No retries permitted until 2023-10-02 19:10:12.421786953 +0000 UTC m=+55.965942245 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/aa9ac9e5-e55b-418e-98f1-7f3bfab478ee-calico-apiserver-certs") pod "calico-apiserver-865c8ff979-kd6b5" (UID: "aa9ac9e5-e55b-418e-98f1-7f3bfab478ee") : secret "calico-apiserver-certs" not found Oct 2 19:10:11.922453 kubelet[2094]: E1002 19:10:11.922430 2094 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:10:11.922692 kubelet[2094]: E1002 19:10:11.922647 2094 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/9e7825fe-7e60-4130-a04f-6e2113b445d1-calico-apiserver-certs podName:9e7825fe-7e60-4130-a04f-6e2113b445d1 nodeName:}" failed. No retries permitted until 2023-10-02 19:10:12.422625469 +0000 UTC m=+55.966780761 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/9e7825fe-7e60-4130-a04f-6e2113b445d1-calico-apiserver-certs") pod "calico-apiserver-865c8ff979-v86vh" (UID: "9e7825fe-7e60-4130-a04f-6e2113b445d1") : secret "calico-apiserver-certs" not found Oct 2 19:10:12.611342 env[1141]: time="2023-10-02T19:10:12.611265908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865c8ff979-kd6b5,Uid:aa9ac9e5-e55b-418e-98f1-7f3bfab478ee,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:10:12.652202 env[1141]: time="2023-10-02T19:10:12.652151019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865c8ff979-v86vh,Uid:9e7825fe-7e60-4130-a04f-6e2113b445d1,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:10:12.810000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.810000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0095cf360 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.810000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.817000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.817000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a0740c0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.823000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.823000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.823000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a0748d0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.823000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.823000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009fec1e0 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.823000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.852000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.852000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00970dd20 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.852000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.853000 audit[1948]: AVC avc: denied { watch } for pid=1948 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:12.853000 audit[1948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a075c80 a2=fc6 a3=0 items=0 ppid=1784 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c50,c473 key=(null) Oct 2 19:10:12.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3438002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:10:12.914012 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:10:12.923010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibbd68b1c74e: link becomes ready Oct 2 19:10:12.930267 systemd-networkd[1023]: calibbd68b1c74e: Link UP Oct 2 19:10:12.930280 systemd-networkd[1023]: calibbd68b1c74e: Gained carrier Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.688 [INFO][3976] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0 calico-apiserver-865c8ff979- calico-apiserver aa9ac9e5-e55b-418e-98f1-7f3bfab478ee 815 0 2023-10-02 19:10:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:865c8ff979 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal calico-apiserver-865c8ff979-kd6b5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibbd68b1c74e [] []}} ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.688 [INFO][3976] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.801 [INFO][4001] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" HandleID="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.842 [INFO][4001] ipam_plugin.go 269: Auto assigning IP ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" HandleID="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001203e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"calico-apiserver-865c8ff979-kd6b5", "timestamp":"2023-10-02 19:10:12.801269594 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:12.957254 env[1141]: time="2023-10-02T19:10:12Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:12.957254 env[1141]: time="2023-10-02T19:10:12Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.842 [INFO][4001] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.846 [INFO][4001] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.860 [INFO][4001] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.871 [INFO][4001] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.874 [INFO][4001] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.884 [INFO][4001] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.884 [INFO][4001] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.886 [INFO][4001] ipam.go 1682: Creating new handle: k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.893 [INFO][4001] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.902 [INFO][4001] ipam.go 1216: Successfully claimed IPs: [192.168.21.5/26] block=192.168.21.0/26 handle="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.902 [INFO][4001] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.5/26] handle="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:12.957254 env[1141]: time="2023-10-02T19:10:12Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:12.957254 env[1141]: 2023-10-02 19:10:12.903 [INFO][4001] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.5/26] IPv6=[] ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" HandleID="k8s-pod-network.e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.905 [INFO][3976] k8s.go 383: Populated endpoint ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0", GenerateName:"calico-apiserver-865c8ff979-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa9ac9e5-e55b-418e-98f1-7f3bfab478ee", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 10, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865c8ff979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-865c8ff979-kd6b5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibbd68b1c74e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.905 [INFO][3976] k8s.go 384: Calico CNI using IPs: [192.168.21.5/32] ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.905 [INFO][3976] dataplane_linux.go 68: Setting the host side veth name to calibbd68b1c74e ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.924 [INFO][3976] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.930 [INFO][3976] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0", GenerateName:"calico-apiserver-865c8ff979-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa9ac9e5-e55b-418e-98f1-7f3bfab478ee", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 10, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865c8ff979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d", Pod:"calico-apiserver-865c8ff979-kd6b5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibbd68b1c74e", MAC:"16:15:ae:23:4f:cb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:12.958554 env[1141]: 2023-10-02 19:10:12.939 [INFO][3976] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-kd6b5" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--kd6b5-eth0" Oct 2 19:10:12.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.48:22-147.75.109.163:56400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:12.974735 systemd[1]: Started sshd@10-10.128.0.48:22-147.75.109.163:56400.service. Oct 2 19:10:13.037016 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb424e089bf: link becomes ready Oct 2 19:10:13.045806 systemd-networkd[1023]: calibb424e089bf: Link UP Oct 2 19:10:13.045817 systemd-networkd[1023]: calibb424e089bf: Gained carrier Oct 2 19:10:13.057510 env[1141]: time="2023-10-02T19:10:13.057425965Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:13.057680 env[1141]: time="2023-10-02T19:10:13.057534586Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:13.057680 env[1141]: time="2023-10-02T19:10:13.057576708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:13.062230 env[1141]: time="2023-10-02T19:10:13.062166290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d pid=4044 runtime=io.containerd.runc.v2 Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.796 [INFO][3988] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0 calico-apiserver-865c8ff979- calico-apiserver 9e7825fe-7e60-4130-a04f-6e2113b445d1 824 0 2023-10-02 19:10:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:865c8ff979 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal calico-apiserver-865c8ff979-v86vh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibb424e089bf [] []}} ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.796 [INFO][3988] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.913 [INFO][4009] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" HandleID="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.964 [INFO][4009] ipam_plugin.go 269: Auto assigning IP ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" HandleID="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00041df80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", "pod":"calico-apiserver-865c8ff979-v86vh", "timestamp":"2023-10-02 19:10:12.913000016 +0000 UTC"}, Hostname:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:10:13.082486 env[1141]: time="2023-10-02T19:10:12Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:13.082486 env[1141]: time="2023-10-02T19:10:12Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.964 [INFO][4009] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal' Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.967 [INFO][4009] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.985 [INFO][4009] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.994 [INFO][4009] ipam.go 489: Trying affinity for 192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:12.997 [INFO][4009] ipam.go 155: Attempting to load block cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.000 [INFO][4009] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.001 [INFO][4009] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.003 [INFO][4009] ipam.go 1682: Creating new handle: k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751 Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.011 [INFO][4009] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.020 [INFO][4009] ipam.go 1216: Successfully claimed IPs: [192.168.21.6/26] block=192.168.21.0/26 handle="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.020 [INFO][4009] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.6/26] handle="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" host="ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal" Oct 2 19:10:13.082486 env[1141]: time="2023-10-02T19:10:13Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:13.082486 env[1141]: 2023-10-02 19:10:13.020 [INFO][4009] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.21.6/26] IPv6=[] ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" HandleID="k8s-pod-network.c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.023 [INFO][3988] k8s.go 383: Populated endpoint ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0", GenerateName:"calico-apiserver-865c8ff979-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e7825fe-7e60-4130-a04f-6e2113b445d1", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 10, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865c8ff979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-865c8ff979-v86vh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibb424e089bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.023 [INFO][3988] k8s.go 384: Calico CNI using IPs: [192.168.21.6/32] ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.023 [INFO][3988] dataplane_linux.go 68: Setting the host side veth name to calibb424e089bf ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.037 [INFO][3988] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.042 [INFO][3988] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0", GenerateName:"calico-apiserver-865c8ff979-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e7825fe-7e60-4130-a04f-6e2113b445d1", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 10, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865c8ff979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751", Pod:"calico-apiserver-865c8ff979-v86vh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibb424e089bf", MAC:"86:de:4b:71:13:9e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:13.083680 env[1141]: 2023-10-02 19:10:13.070 [INFO][3988] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751" Namespace="calico-apiserver" Pod="calico-apiserver-865c8ff979-v86vh" WorkloadEndpoint="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--apiserver--865c8ff979--v86vh-eth0" Oct 2 19:10:13.113437 systemd[1]: Started cri-containerd-e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d.scope. Oct 2 19:10:13.131374 env[1141]: time="2023-10-02T19:10:13.127315431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:10:13.131374 env[1141]: time="2023-10-02T19:10:13.127403806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:10:13.131374 env[1141]: time="2023-10-02T19:10:13.127457327Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:10:13.131374 env[1141]: time="2023-10-02T19:10:13.127638911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751 pid=4077 runtime=io.containerd.runc.v2 Oct 2 19:10:13.153057 systemd[1]: run-containerd-runc-k8s.io-e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d-runc.Ol3Iez.mount: Deactivated successfully. Oct 2 19:10:13.173000 audit[4096]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:13.173000 audit[4096]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7fff31f4a280 a2=0 a3=7fff31f4a26c items=0 ppid=3104 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.173000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:13.183715 systemd[1]: Started cri-containerd-c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751.scope. Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.250000 audit: BPF prog-id=186 op=LOAD Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4044 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663535656139656366623236306539313231303232356162313638 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4044 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663535656139656366623236306539313231303232356162313638 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit: BPF prog-id=187 op=LOAD Oct 2 19:10:13.252000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00029e1d0 items=0 ppid=4044 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663535656139656366623236306539313231303232356162313638 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit: BPF prog-id=188 op=LOAD Oct 2 19:10:13.252000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00029e218 items=0 ppid=4044 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663535656139656366623236306539313231303232356162313638 Oct 2 19:10:13.252000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:10:13.252000 audit: BPF prog-id=187 op=UNLOAD Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.252000 audit: BPF prog-id=189 op=LOAD Oct 2 19:10:13.252000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00029e628 items=0 ppid=4044 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535663535656139656366623236306539313231303232356162313638 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.254000 audit: BPF prog-id=190 op=LOAD Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4077 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613462613334646665326365633461656234366562616532633530 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4077 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613462613334646665326365633461656234366562616532633530 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit: BPF prog-id=191 op=LOAD Oct 2 19:10:13.258000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003dc740 items=0 ppid=4077 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613462613334646665326365633461656234366562616532633530 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.258000 audit: BPF prog-id=192 op=LOAD Oct 2 19:10:13.258000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003dc788 items=0 ppid=4077 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613462613334646665326365633461656234366562616532633530 Oct 2 19:10:13.258000 audit: BPF prog-id=192 op=UNLOAD Oct 2 19:10:13.259000 audit: BPF prog-id=191 op=UNLOAD Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:13.259000 audit: BPF prog-id=193 op=LOAD Oct 2 19:10:13.259000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003dcb98 items=0 ppid=4077 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613462613334646665326365633461656234366562616532633530 Oct 2 19:10:13.305000 audit[4117]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_chain pid=4117 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:10:13.305000 audit[4117]: SYSCALL arch=c000003e syscall=46 success=yes exit=27348 a0=3 a1=7ffcd9200eb0 a2=0 a3=7ffcd9200e9c items=0 ppid=3104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.305000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:10:13.330000 audit[4026]: USER_ACCT pid=4026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.332062 sshd[4026]: Accepted publickey for core from 147.75.109.163 port 56400 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:13.333000 audit[4026]: CRED_ACQ pid=4026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.333000 audit[4026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3ea81700 a2=3 a3=0 items=0 ppid=1 pid=4026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:13.335283 sshd[4026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:13.345248 systemd[1]: Started session-10.scope. Oct 2 19:10:13.348642 systemd-logind[1128]: New session 10 of user core. Oct 2 19:10:13.356000 audit[4026]: USER_START pid=4026 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.359000 audit[4131]: CRED_ACQ pid=4131 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.362259 env[1141]: time="2023-10-02T19:10:13.362207593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865c8ff979-kd6b5,Uid:aa9ac9e5-e55b-418e-98f1-7f3bfab478ee,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e5f55ea9ecfb260e91210225ab16868eb029fd2359ccf23280998efec8ccac7d\"" Oct 2 19:10:13.365835 env[1141]: time="2023-10-02T19:10:13.364738524Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:13.373203 env[1141]: time="2023-10-02T19:10:13.373134199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865c8ff979-v86vh,Uid:9e7825fe-7e60-4130-a04f-6e2113b445d1,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c0a4ba34dfe2cec4aeb46ebae2c507e1a0f8d01045b47d541c9e2e51dc663751\"" Oct 2 19:10:13.500810 env[1141]: time="2023-10-02T19:10:13.500648040Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:13.502590 env[1141]: time="2023-10-02T19:10:13.502523109Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:13.503199 kubelet[2094]: E1002 19:10:13.503065 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:13.503199 kubelet[2094]: E1002 19:10:13.503118 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:13.504205 kubelet[2094]: E1002 19:10:13.503801 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hmxxs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-865c8ff979-kd6b5_calico-apiserver(aa9ac9e5-e55b-418e-98f1-7f3bfab478ee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:13.504205 kubelet[2094]: E1002 19:10:13.503883 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" podUID=aa9ac9e5-e55b-418e-98f1-7f3bfab478ee Oct 2 19:10:13.504835 env[1141]: time="2023-10-02T19:10:13.504802131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:13.651393 env[1141]: time="2023-10-02T19:10:13.651317149Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:13.653643 env[1141]: time="2023-10-02T19:10:13.653571837Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:13.653902 kubelet[2094]: E1002 19:10:13.653874 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:13.654059 kubelet[2094]: E1002 19:10:13.653929 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:13.654128 kubelet[2094]: E1002 19:10:13.654077 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kbkjm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-865c8ff979-v86vh_calico-apiserver(9e7825fe-7e60-4130-a04f-6e2113b445d1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:13.654299 kubelet[2094]: E1002 19:10:13.654144 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" podUID=9e7825fe-7e60-4130-a04f-6e2113b445d1 Oct 2 19:10:13.665927 sshd[4026]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:13.666000 audit[4026]: USER_END pid=4026 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.666000 audit[4026]: CRED_DISP pid=4026 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:13.670335 systemd[1]: sshd@10-10.128.0.48:22-147.75.109.163:56400.service: Deactivated successfully. Oct 2 19:10:13.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.48:22-147.75.109.163:56400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:13.671446 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:10:13.672065 systemd-logind[1128]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:10:13.673671 systemd-logind[1128]: Removed session 10. Oct 2 19:10:14.016683 kubelet[2094]: E1002 19:10:14.016415 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" podUID=9e7825fe-7e60-4130-a04f-6e2113b445d1 Oct 2 19:10:14.022265 kubelet[2094]: E1002 19:10:14.022242 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" podUID=aa9ac9e5-e55b-418e-98f1-7f3bfab478ee Oct 2 19:10:14.064000 audit[4148]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:14.064000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa3ea67b0 a2=0 a3=7fffa3ea679c items=0 ppid=2237 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:14.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:14.065000 audit[4148]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:14.065000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffa3ea67b0 a2=0 a3=7fffa3ea679c items=0 ppid=2237 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:14.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:14.078000 audit[4150]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:14.078000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff0403e610 a2=0 a3=7fff0403e5fc items=0 ppid=2237 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:14.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:14.079000 audit[4150]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4150 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:14.079000 audit[4150]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff0403e610 a2=0 a3=7fff0403e5fc items=0 ppid=2237 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:14.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:14.289309 systemd-networkd[1023]: calibb424e089bf: Gained IPv6LL Oct 2 19:10:14.737706 systemd-networkd[1023]: calibbd68b1c74e: Gained IPv6LL Oct 2 19:10:15.024173 kubelet[2094]: E1002 19:10:15.023889 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" podUID=aa9ac9e5-e55b-418e-98f1-7f3bfab478ee Oct 2 19:10:15.025586 kubelet[2094]: E1002 19:10:15.025554 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" podUID=9e7825fe-7e60-4130-a04f-6e2113b445d1 Oct 2 19:10:16.692502 env[1141]: time="2023-10-02T19:10:16.692439767Z" level=info msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.801 [WARNING][4167] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8468013a-35fe-4495-942c-46dd66936e3b", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0", Pod:"coredns-5d78c9869d-gvsnl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali009103d822d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.802 [INFO][4167] k8s.go 576: Cleaning up netns ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.802 [INFO][4167] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" iface="eth0" netns="" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.802 [INFO][4167] k8s.go 583: Releasing IP address(es) ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.802 [INFO][4167] utils.go 196: Calico CNI releasing IP address ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.862 [INFO][4175] ipam_plugin.go 416: Releasing address using handleID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:16.876801 env[1141]: time="2023-10-02T19:10:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:16.876801 env[1141]: time="2023-10-02T19:10:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.871 [WARNING][4175] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.871 [INFO][4175] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:16.876801 env[1141]: time="2023-10-02T19:10:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:16.876801 env[1141]: 2023-10-02 19:10:16.875 [INFO][4167] k8s.go 589: Teardown processing complete. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:16.877639 env[1141]: time="2023-10-02T19:10:16.876850820Z" level=info msg="TearDown network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" successfully" Oct 2 19:10:16.877639 env[1141]: time="2023-10-02T19:10:16.876892476Z" level=info msg="StopPodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" returns successfully" Oct 2 19:10:16.877639 env[1141]: time="2023-10-02T19:10:16.877599242Z" level=info msg="RemovePodSandbox for \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" Oct 2 19:10:16.877812 env[1141]: time="2023-10-02T19:10:16.877648040Z" level=info msg="Forcibly stopping sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\"" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.957 [WARNING][4193] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8468013a-35fe-4495-942c-46dd66936e3b", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"341b4aac98989605017a0bab4a9572608f67a2a0f9dc854958dfaadfefd4e2d0", Pod:"coredns-5d78c9869d-gvsnl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali009103d822d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.957 [INFO][4193] k8s.go 576: Cleaning up netns ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.957 [INFO][4193] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" iface="eth0" netns="" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.957 [INFO][4193] k8s.go 583: Releasing IP address(es) ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.957 [INFO][4193] utils.go 196: Calico CNI releasing IP address ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:16.998 [INFO][4199] ipam_plugin.go 416: Releasing address using handleID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:17.009964 env[1141]: time="2023-10-02T19:10:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.009964 env[1141]: time="2023-10-02T19:10:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:17.006 [WARNING][4199] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:17.006 [INFO][4199] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" HandleID="k8s-pod-network.c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--gvsnl-eth0" Oct 2 19:10:17.009964 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.009964 env[1141]: 2023-10-02 19:10:17.008 [INFO][4193] k8s.go 589: Teardown processing complete. ContainerID="c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd" Oct 2 19:10:17.010955 env[1141]: time="2023-10-02T19:10:17.010906995Z" level=info msg="TearDown network for sandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" successfully" Oct 2 19:10:17.016431 env[1141]: time="2023-10-02T19:10:17.016385324Z" level=info msg="RemovePodSandbox \"c97c306a263bb6fc3ad2ca3d0662a0f1d09b6c609cccdf733d4c152a920d63dd\" returns successfully" Oct 2 19:10:17.017365 env[1141]: time="2023-10-02T19:10:17.017308494Z" level=info msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.109 [WARNING][4220] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fb77709d-d2cd-400a-a395-69f5f0b19a47", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8", Pod:"csi-node-driver-bgqn6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab8084ea1b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.110 [INFO][4220] k8s.go 576: Cleaning up netns ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.110 [INFO][4220] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" iface="eth0" netns="" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.110 [INFO][4220] k8s.go 583: Releasing IP address(es) ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.110 [INFO][4220] utils.go 196: Calico CNI releasing IP address ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.160 [INFO][4226] ipam_plugin.go 416: Releasing address using handleID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.176810 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.176810 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.172 [WARNING][4226] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.172 [INFO][4226] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.176810 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.176810 env[1141]: 2023-10-02 19:10:17.175 [INFO][4220] k8s.go 589: Teardown processing complete. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.177678 env[1141]: time="2023-10-02T19:10:17.176852207Z" level=info msg="TearDown network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" successfully" Oct 2 19:10:17.177678 env[1141]: time="2023-10-02T19:10:17.176893970Z" level=info msg="StopPodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" returns successfully" Oct 2 19:10:17.177787 env[1141]: time="2023-10-02T19:10:17.177739054Z" level=info msg="RemovePodSandbox for \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" Oct 2 19:10:17.177841 env[1141]: time="2023-10-02T19:10:17.177782066Z" level=info msg="Forcibly stopping sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\"" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.227 [WARNING][4244] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fb77709d-d2cd-400a-a395-69f5f0b19a47", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"d53f57d2268db4361be440aee7a925b9540f5f5568dd4b2e0f34260284733fa8", Pod:"csi-node-driver-bgqn6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab8084ea1b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.227 [INFO][4244] k8s.go 576: Cleaning up netns ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.227 [INFO][4244] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" iface="eth0" netns="" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.227 [INFO][4244] k8s.go 583: Releasing IP address(es) ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.228 [INFO][4244] utils.go 196: Calico CNI releasing IP address ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.262 [INFO][4250] ipam_plugin.go 416: Releasing address using handleID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.278851 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.278851 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.274 [WARNING][4250] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.274 [INFO][4250] ipam_plugin.go 444: Releasing address using workloadID ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" HandleID="k8s-pod-network.f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-csi--node--driver--bgqn6-eth0" Oct 2 19:10:17.278851 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.278851 env[1141]: 2023-10-02 19:10:17.277 [INFO][4244] k8s.go 589: Teardown processing complete. ContainerID="f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a" Oct 2 19:10:17.279694 env[1141]: time="2023-10-02T19:10:17.278889069Z" level=info msg="TearDown network for sandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" successfully" Oct 2 19:10:17.283819 env[1141]: time="2023-10-02T19:10:17.283775747Z" level=info msg="RemovePodSandbox \"f5ba32545b93c474e6a03fe94c19a92a3f6c7d13d000afbba7819be79613b56a\" returns successfully" Oct 2 19:10:17.284556 env[1141]: time="2023-10-02T19:10:17.284496259Z" level=info msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.332 [WARNING][4268] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"dc11dcf6-6adf-4367-95d8-eb8f31460f7c", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab", Pod:"coredns-5d78c9869d-wsv26", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec6e70f131a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.333 [INFO][4268] k8s.go 576: Cleaning up netns ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.333 [INFO][4268] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" iface="eth0" netns="" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.333 [INFO][4268] k8s.go 583: Releasing IP address(es) ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.333 [INFO][4268] utils.go 196: Calico CNI releasing IP address ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.376 [INFO][4276] ipam_plugin.go 416: Releasing address using handleID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.388316 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.388316 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.383 [WARNING][4276] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.384 [INFO][4276] ipam_plugin.go 444: Releasing address using workloadID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.388316 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.388316 env[1141]: 2023-10-02 19:10:17.387 [INFO][4268] k8s.go 589: Teardown processing complete. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.389189 env[1141]: time="2023-10-02T19:10:17.388353759Z" level=info msg="TearDown network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" successfully" Oct 2 19:10:17.389189 env[1141]: time="2023-10-02T19:10:17.388400973Z" level=info msg="StopPodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" returns successfully" Oct 2 19:10:17.389189 env[1141]: time="2023-10-02T19:10:17.389135929Z" level=info msg="RemovePodSandbox for \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" Oct 2 19:10:17.389346 env[1141]: time="2023-10-02T19:10:17.389186976Z" level=info msg="Forcibly stopping sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\"" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.452 [WARNING][4295] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"dc11dcf6-6adf-4367-95d8-eb8f31460f7c", ResourceVersion:"709", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"3b67c607c9b62cc41642464c63b11eefa52adce5201c8d404d0fe791c1738fab", Pod:"coredns-5d78c9869d-wsv26", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliec6e70f131a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.452 [INFO][4295] k8s.go 576: Cleaning up netns ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.452 [INFO][4295] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" iface="eth0" netns="" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.452 [INFO][4295] k8s.go 583: Releasing IP address(es) ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.452 [INFO][4295] utils.go 196: Calico CNI releasing IP address ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.493 [INFO][4301] ipam_plugin.go 416: Releasing address using handleID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.506454 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.506454 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.500 [WARNING][4301] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.500 [INFO][4301] ipam_plugin.go 444: Releasing address using workloadID ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" HandleID="k8s-pod-network.eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--wsv26-eth0" Oct 2 19:10:17.506454 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.506454 env[1141]: 2023-10-02 19:10:17.504 [INFO][4295] k8s.go 589: Teardown processing complete. ContainerID="eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3" Oct 2 19:10:17.507300 env[1141]: time="2023-10-02T19:10:17.506483524Z" level=info msg="TearDown network for sandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" successfully" Oct 2 19:10:17.511751 env[1141]: time="2023-10-02T19:10:17.511660323Z" level=info msg="RemovePodSandbox \"eee9e3c469f65ed6238430822077cc1350037d163bd6acbcdb1bf1e1cc05c5c3\" returns successfully" Oct 2 19:10:17.512855 env[1141]: time="2023-10-02T19:10:17.512816612Z" level=info msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.567 [WARNING][4320] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2faa1229-d753-4b8a-a619-ef2ad245108c", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437", Pod:"calico-kube-controllers-7bd445fdb4-h4dlx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califcd20006314", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.567 [INFO][4320] k8s.go 576: Cleaning up netns ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.567 [INFO][4320] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" iface="eth0" netns="" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.567 [INFO][4320] k8s.go 583: Releasing IP address(es) ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.567 [INFO][4320] utils.go 196: Calico CNI releasing IP address ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.600 [INFO][4326] ipam_plugin.go 416: Releasing address using handleID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.614368 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.614368 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.610 [WARNING][4326] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.610 [INFO][4326] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.614368 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.614368 env[1141]: 2023-10-02 19:10:17.613 [INFO][4320] k8s.go 589: Teardown processing complete. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.615334 env[1141]: time="2023-10-02T19:10:17.615287012Z" level=info msg="TearDown network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" successfully" Oct 2 19:10:17.615460 env[1141]: time="2023-10-02T19:10:17.615432795Z" level=info msg="StopPodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" returns successfully" Oct 2 19:10:17.617058 env[1141]: time="2023-10-02T19:10:17.617015083Z" level=info msg="RemovePodSandbox for \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" Oct 2 19:10:17.617199 env[1141]: time="2023-10-02T19:10:17.617064439Z" level=info msg="Forcibly stopping sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\"" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.669 [WARNING][4345] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2faa1229-d753-4b8a-a619-ef2ad245108c", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-76f35c91e60fd09713ee.c.flatcar-212911.internal", ContainerID:"37cc52d55b66f48074793cd69d1f4a2f5fdef83748a7cc15e4a49c0b02e08437", Pod:"calico-kube-controllers-7bd445fdb4-h4dlx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califcd20006314", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.670 [INFO][4345] k8s.go 576: Cleaning up netns ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.670 [INFO][4345] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" iface="eth0" netns="" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.672 [INFO][4345] k8s.go 583: Releasing IP address(es) ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.672 [INFO][4345] utils.go 196: Calico CNI releasing IP address ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.697 [INFO][4351] ipam_plugin.go 416: Releasing address using handleID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.710481 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:17.710481 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.706 [WARNING][4351] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.706 [INFO][4351] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" HandleID="k8s-pod-network.10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Workload="ci--3510--3--0--76f35c91e60fd09713ee.c.flatcar--212911.internal-k8s-calico--kube--controllers--7bd445fdb4--h4dlx-eth0" Oct 2 19:10:17.710481 env[1141]: time="2023-10-02T19:10:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:17.710481 env[1141]: 2023-10-02 19:10:17.709 [INFO][4345] k8s.go 589: Teardown processing complete. ContainerID="10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd" Oct 2 19:10:17.711879 env[1141]: time="2023-10-02T19:10:17.711824497Z" level=info msg="TearDown network for sandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" successfully" Oct 2 19:10:17.716902 env[1141]: time="2023-10-02T19:10:17.716854670Z" level=info msg="RemovePodSandbox \"10e37ad91ec6bdda2ef01bf96676bca3f0e159b549c14451e2191493d7c239dd\" returns successfully" Oct 2 19:10:18.738873 env[1141]: time="2023-10-02T19:10:18.738802598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:18.858268 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.0AoIza.mount: Deactivated successfully. Oct 2 19:10:18.861658 env[1141]: time="2023-10-02T19:10:18.861590266Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:18.863641 env[1141]: time="2023-10-02T19:10:18.863583530Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:18.866212 kubelet[2094]: E1002 19:10:18.864116 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:18.866212 kubelet[2094]: E1002 19:10:18.864171 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:18.866212 kubelet[2094]: E1002 19:10:18.864294 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:18.885493 env[1141]: time="2023-10-02T19:10:18.884591525Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:18.931113 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.Ag5W5e.mount: Deactivated successfully. Oct 2 19:10:19.031001 env[1141]: time="2023-10-02T19:10:19.030890343Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:19.032904 env[1141]: time="2023-10-02T19:10:19.032796767Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:19.033220 kubelet[2094]: E1002 19:10:19.033186 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:19.033376 kubelet[2094]: E1002 19:10:19.033247 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:19.033376 kubelet[2094]: E1002 19:10:19.033370 2094 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:19.033609 kubelet[2094]: E1002 19:10:19.033449 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:10:23.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.48:22-147.75.109.163:42534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:23.711230 systemd[1]: Started sshd@11-10.128.0.48:22-147.75.109.163:42534.service. Oct 2 19:10:23.742359 kernel: kauditd_printk_skb: 169 callbacks suppressed Oct 2 19:10:23.742476 kernel: audit: type=1130 audit(1696273823.711:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.48:22-147.75.109.163:42534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:24.000000 audit[4422]: USER_ACCT pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.001817 sshd[4422]: Accepted publickey for core from 147.75.109.163 port 42534 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:24.031069 kernel: audit: type=1101 audit(1696273824.000:1410): pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.030000 audit[4422]: CRED_ACQ pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.032435 sshd[4422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:24.040795 systemd[1]: Started session-11.scope. Oct 2 19:10:24.043311 systemd-logind[1128]: New session 11 of user core. Oct 2 19:10:24.073566 kernel: audit: type=1103 audit(1696273824.030:1411): pid=4422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.073680 kernel: audit: type=1006 audit(1696273824.030:1412): pid=4422 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:10:24.030000 audit[4422]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeed57ad0 a2=3 a3=0 items=0 ppid=1 pid=4422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:24.101822 kernel: audit: type=1300 audit(1696273824.030:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeed57ad0 a2=3 a3=0 items=0 ppid=1 pid=4422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:24.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:24.054000 audit[4422]: USER_START pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.143843 kernel: audit: type=1327 audit(1696273824.030:1412): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:24.144016 kernel: audit: type=1105 audit(1696273824.054:1413): pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.057000 audit[4424]: CRED_ACQ pid=4424 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.169024 kernel: audit: type=1103 audit(1696273824.057:1414): pid=4424 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.302618 sshd[4422]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:24.303000 audit[4422]: USER_END pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.307482 systemd-logind[1128]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:10:24.309711 systemd[1]: sshd@11-10.128.0.48:22-147.75.109.163:42534.service: Deactivated successfully. Oct 2 19:10:24.310852 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:10:24.313073 systemd-logind[1128]: Removed session 11. Oct 2 19:10:24.303000 audit[4422]: CRED_DISP pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.362191 kernel: audit: type=1106 audit(1696273824.303:1415): pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.362302 kernel: audit: type=1104 audit(1696273824.303:1416): pid=4422 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.48:22-147.75.109.163:42534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:24.363135 systemd[1]: Started sshd@12-10.128.0.48:22-147.75.109.163:42546.service. Oct 2 19:10:24.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.48:22-147.75.109.163:42546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:24.652000 audit[4435]: USER_ACCT pid=4435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.653941 sshd[4435]: Accepted publickey for core from 147.75.109.163 port 42546 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:24.654000 audit[4435]: CRED_ACQ pid=4435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.654000 audit[4435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe18a3e450 a2=3 a3=0 items=0 ppid=1 pid=4435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:24.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:24.655990 sshd[4435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:24.663417 systemd[1]: Started session-12.scope. Oct 2 19:10:24.664044 systemd-logind[1128]: New session 12 of user core. Oct 2 19:10:24.672000 audit[4435]: USER_START pid=4435 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:24.674000 audit[4437]: CRED_ACQ pid=4437 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:25.913245 sshd[4435]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:25.915000 audit[4435]: USER_END pid=4435 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:25.916000 audit[4435]: CRED_DISP pid=4435 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:25.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.48:22-147.75.109.163:42546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:25.920318 systemd[1]: sshd@12-10.128.0.48:22-147.75.109.163:42546.service: Deactivated successfully. Oct 2 19:10:25.921702 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:10:25.923294 systemd-logind[1128]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:10:25.924862 systemd-logind[1128]: Removed session 12. Oct 2 19:10:25.965180 systemd[1]: Started sshd@13-10.128.0.48:22-147.75.109.163:42552.service. Oct 2 19:10:25.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.48:22-147.75.109.163:42552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:26.262000 audit[4445]: USER_ACCT pid=4445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.263607 sshd[4445]: Accepted publickey for core from 147.75.109.163 port 42552 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:26.264000 audit[4445]: CRED_ACQ pid=4445 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.264000 audit[4445]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff626c1ce0 a2=3 a3=0 items=0 ppid=1 pid=4445 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:26.264000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:26.266488 sshd[4445]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:26.273867 systemd[1]: Started session-13.scope. Oct 2 19:10:26.274950 systemd-logind[1128]: New session 13 of user core. Oct 2 19:10:26.283000 audit[4445]: USER_START pid=4445 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.289000 audit[4447]: CRED_ACQ pid=4447 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.556527 sshd[4445]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:26.557000 audit[4445]: USER_END pid=4445 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.557000 audit[4445]: CRED_DISP pid=4445 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:26.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.48:22-147.75.109.163:42552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:26.561441 systemd[1]: sshd@13-10.128.0.48:22-147.75.109.163:42552.service: Deactivated successfully. Oct 2 19:10:26.562723 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:10:26.564269 systemd-logind[1128]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:10:26.565598 systemd-logind[1128]: Removed session 13. Oct 2 19:10:28.738292 env[1141]: time="2023-10-02T19:10:28.738237803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:28.855430 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.HM9m5O.mount: Deactivated successfully. Oct 2 19:10:28.865247 env[1141]: time="2023-10-02T19:10:28.865178179Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:28.867298 env[1141]: time="2023-10-02T19:10:28.867211012Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:28.868963 kubelet[2094]: E1002 19:10:28.867750 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:28.868963 kubelet[2094]: E1002 19:10:28.867807 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:28.868963 kubelet[2094]: E1002 19:10:28.867933 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hmxxs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-865c8ff979-kd6b5_calico-apiserver(aa9ac9e5-e55b-418e-98f1-7f3bfab478ee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:28.868963 kubelet[2094]: E1002 19:10:28.867997 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" podUID=aa9ac9e5-e55b-418e-98f1-7f3bfab478ee Oct 2 19:10:28.906151 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.bj1Bzc.mount: Deactivated successfully. Oct 2 19:10:29.738218 env[1141]: time="2023-10-02T19:10:29.738168252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:29.864361 env[1141]: time="2023-10-02T19:10:29.864277814Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:29.866357 env[1141]: time="2023-10-02T19:10:29.866269596Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:29.866767 kubelet[2094]: E1002 19:10:29.866735 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:29.867080 kubelet[2094]: E1002 19:10:29.867057 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:29.867399 kubelet[2094]: E1002 19:10:29.867365 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-kbkjm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-865c8ff979-v86vh_calico-apiserver(9e7825fe-7e60-4130-a04f-6e2113b445d1): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:29.867717 kubelet[2094]: E1002 19:10:29.867694 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" podUID=9e7825fe-7e60-4130-a04f-6e2113b445d1 Oct 2 19:10:30.295000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.301621 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:10:30.301754 kernel: audit: type=1400 audit(1696273830.295:1436): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.295000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.353375 kernel: audit: type=1400 audit(1696273830.295:1437): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.353532 kernel: audit: type=1300 audit(1696273830.295:1437): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d1560 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.295000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d1560 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.416722 kernel: audit: type=1327 audit(1696273830.295:1437): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.416902 kernel: audit: type=1400 audit(1696273830.295:1438): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.295000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.295000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d1680 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.476915 kernel: audit: type=1300 audit(1696273830.295:1438): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024d1680 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.477104 kernel: audit: type=1327 audit(1696273830.295:1438): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.295000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475180 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.540322 kernel: audit: type=1300 audit(1696273830.295:1436): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475180 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.540494 kernel: audit: type=1327 audit(1696273830.295:1436): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:30.295000 audit[1970]: AVC avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.295000 audit[1970]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014751a0 a2=fc6 a3=0 items=0 ppid=1819 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 key=(null) Oct 2 19:10:30.595057 kernel: audit: type=1400 audit(1696273830.295:1439): avc: denied { watch } for pid=1970 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c573 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:30.295000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:31.738124 kubelet[2094]: E1002 19:10:31.738094 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:10:36.605328 systemd[1]: Started sshd@14-10.128.0.48:22-147.75.109.163:39900.service. Oct 2 19:10:36.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.48:22-147.75.109.163:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:36.617689 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:10:36.617822 kernel: audit: type=1130 audit(1696273836.611:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.48:22-147.75.109.163:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:36.901000 audit[4538]: USER_ACCT pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:36.932835 sshd[4538]: Accepted publickey for core from 147.75.109.163 port 39900 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:36.933862 kernel: audit: type=1101 audit(1696273836.901:1441): pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:36.933704 sshd[4538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:36.940424 systemd-logind[1128]: New session 14 of user core. Oct 2 19:10:36.941635 systemd[1]: Started session-14.scope. Oct 2 19:10:36.931000 audit[4538]: CRED_ACQ pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:36.995501 kernel: audit: type=1103 audit(1696273836.931:1442): pid=4538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:36.997701 kernel: audit: type=1006 audit(1696273836.932:1443): pid=4538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:10:36.997748 kernel: audit: type=1300 audit(1696273836.932:1443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d080980 a2=3 a3=0 items=0 ppid=1 pid=4538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:36.932000 audit[4538]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d080980 a2=3 a3=0 items=0 ppid=1 pid=4538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:37.025628 kernel: audit: type=1327 audit(1696273836.932:1443): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:36.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:36.949000 audit[4538]: USER_START pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.065777 kernel: audit: type=1105 audit(1696273836.949:1444): pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:36.951000 audit[4540]: CRED_ACQ pid=4540 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.091009 kernel: audit: type=1103 audit(1696273836.951:1445): pid=4540 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.234942 sshd[4538]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:37.236000 audit[4538]: USER_END pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.241151 systemd-logind[1128]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:10:37.243599 systemd[1]: sshd@14-10.128.0.48:22-147.75.109.163:39900.service: Deactivated successfully. Oct 2 19:10:37.244750 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:10:37.246934 systemd-logind[1128]: Removed session 14. Oct 2 19:10:37.271003 kernel: audit: type=1106 audit(1696273837.236:1446): pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.271151 kernel: audit: type=1104 audit(1696273837.236:1447): pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.236000 audit[4538]: CRED_DISP pid=4538 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:37.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.48:22-147.75.109.163:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:38.852266 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.v757yt.mount: Deactivated successfully. Oct 2 19:10:38.907371 systemd[1]: run-containerd-runc-k8s.io-2ce4210ee5c1eb38bbf155c7de55b6444824babe30634ddf7afe4018b35a0704-runc.TtBM99.mount: Deactivated successfully. Oct 2 19:10:41.737750 kubelet[2094]: E1002 19:10:41.737717 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-v86vh" podUID=9e7825fe-7e60-4130-a04f-6e2113b445d1 Oct 2 19:10:42.745705 kubelet[2094]: E1002 19:10:42.745593 2094 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:10:42.747183 env[1141]: time="2023-10-02T19:10:42.746737662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:42.878105 env[1141]: time="2023-10-02T19:10:42.877965478Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:42.879785 env[1141]: time="2023-10-02T19:10:42.879706181Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:42.880345 kubelet[2094]: E1002 19:10:42.880303 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:42.880492 kubelet[2094]: E1002 19:10:42.880367 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:42.880492 kubelet[2094]: E1002 19:10:42.880481 2094 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:42.882666 env[1141]: time="2023-10-02T19:10:42.882396652Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:43.021684 env[1141]: time="2023-10-02T19:10:43.021598630Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:43.026205 env[1141]: time="2023-10-02T19:10:43.026142303Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:43.026466 kubelet[2094]: E1002 19:10:43.026424 2094 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:43.026581 kubelet[2094]: E1002 19:10:43.026477 2094 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:43.026661 kubelet[2094]: E1002 19:10:43.026611 2094 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jwq59,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bgqn6_calico-system(fb77709d-d2cd-400a-a395-69f5f0b19a47): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:43.026831 kubelet[2094]: E1002 19:10:43.026696 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bgqn6" podUID=fb77709d-d2cd-400a-a395-69f5f0b19a47 Oct 2 19:10:43.737459 kubelet[2094]: E1002 19:10:43.737412 2094 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865c8ff979-kd6b5" podUID=aa9ac9e5-e55b-418e-98f1-7f3bfab478ee Oct 2 19:10:47.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.48:22-147.75.109.163:46858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:47.282631 systemd[1]: Started sshd@15-10.128.0.48:22-147.75.109.163:46858.service. Oct 2 19:10:47.288322 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:10:47.288438 kernel: audit: type=1130 audit(1696273847.281:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.48:22-147.75.109.163:46858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:47.581000 audit[4618]: USER_ACCT pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.582789 sshd[4618]: Accepted publickey for core from 147.75.109.163 port 46858 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:10:47.611000 audit[4618]: CRED_ACQ pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.613280 sshd[4618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:47.624574 systemd[1]: Started session-15.scope. Oct 2 19:10:47.625303 systemd-logind[1128]: New session 15 of user core. Oct 2 19:10:47.638950 kernel: audit: type=1101 audit(1696273847.581:1450): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.639083 kernel: audit: type=1103 audit(1696273847.611:1451): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.639129 kernel: audit: type=1006 audit(1696273847.611:1452): pid=4618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:10:47.611000 audit[4618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53f3b9b0 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:47.682252 kernel: audit: type=1300 audit(1696273847.611:1452): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff53f3b9b0 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:47.682351 kernel: audit: type=1327 audit(1696273847.611:1452): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:47.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:47.691685 kernel: audit: type=1105 audit(1696273847.635:1453): pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.635000 audit[4618]: USER_START pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.639000 audit[4620]: CRED_ACQ pid=4620 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.748425 kernel: audit: type=1103 audit(1696273847.639:1454): pid=4620 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.892598 sshd[4618]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:47.894000 audit[4618]: USER_END pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.898287 systemd-logind[1128]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:10:47.900858 systemd[1]: sshd@15-10.128.0.48:22-147.75.109.163:46858.service: Deactivated successfully. Oct 2 19:10:47.902073 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:10:47.904774 systemd-logind[1128]: Removed session 15. Oct 2 19:10:47.894000 audit[4618]: CRED_DISP pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.951881 kernel: audit: type=1106 audit(1696273847.894:1455): pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.952083 kernel: audit: type=1104 audit(1696273847.894:1456): pid=4618 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:10:47.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.48:22-147.75.109.163:46858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'