Oct 2 19:18:01.107875 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:18:01.107916 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:18:01.107934 kernel: BIOS-provided physical RAM map: Oct 2 19:18:01.107948 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Oct 2 19:18:01.107960 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Oct 2 19:18:01.107974 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Oct 2 19:18:01.107994 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Oct 2 19:18:01.108007 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Oct 2 19:18:01.108020 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Oct 2 19:18:01.108031 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Oct 2 19:18:01.108061 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Oct 2 19:18:01.108074 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Oct 2 19:18:01.108088 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Oct 2 19:18:01.108102 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Oct 2 19:18:01.108123 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Oct 2 19:18:01.108138 kernel: NX (Execute Disable) protection: active Oct 2 19:18:01.108152 kernel: efi: EFI v2.70 by EDK II Oct 2 19:18:01.108167 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe386218 RNG=0xbfb73018 TPMEventLog=0xbe2c8018 Oct 2 19:18:01.108183 kernel: random: crng init done Oct 2 19:18:01.108198 kernel: SMBIOS 2.4 present. Oct 2 19:18:01.108213 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Oct 2 19:18:01.108227 kernel: Hypervisor detected: KVM Oct 2 19:18:01.108244 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:18:01.108257 kernel: kvm-clock: cpu 0, msr 1c6f8a001, primary cpu clock Oct 2 19:18:01.108272 kernel: kvm-clock: using sched offset of 13080759192 cycles Oct 2 19:18:01.108287 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:18:01.108302 kernel: tsc: Detected 2299.998 MHz processor Oct 2 19:18:01.108317 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:18:01.108333 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:18:01.108348 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Oct 2 19:18:01.108364 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:18:01.108379 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Oct 2 19:18:01.108398 kernel: Using GB pages for direct mapping Oct 2 19:18:01.108414 kernel: Secure boot disabled Oct 2 19:18:01.108429 kernel: ACPI: Early table checksum verification disabled Oct 2 19:18:01.108444 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Oct 2 19:18:01.108460 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Oct 2 19:18:01.108475 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Oct 2 19:18:01.108490 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Oct 2 19:18:01.108505 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Oct 2 19:18:01.108543 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Oct 2 19:18:01.108559 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Oct 2 19:18:01.108575 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Oct 2 19:18:01.108592 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Oct 2 19:18:01.108609 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Oct 2 19:18:01.108625 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Oct 2 19:18:01.108645 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Oct 2 19:18:01.108661 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Oct 2 19:18:01.108677 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Oct 2 19:18:01.108692 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Oct 2 19:18:01.108708 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Oct 2 19:18:01.108724 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Oct 2 19:18:01.108741 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Oct 2 19:18:01.108757 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Oct 2 19:18:01.108773 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Oct 2 19:18:01.111473 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:18:01.111505 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:18:01.111523 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 2 19:18:01.111546 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Oct 2 19:18:01.111562 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Oct 2 19:18:01.111579 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Oct 2 19:18:01.111596 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Oct 2 19:18:01.111613 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Oct 2 19:18:01.111630 kernel: Zone ranges: Oct 2 19:18:01.111652 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:18:01.111669 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:18:01.111685 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:18:01.111702 kernel: Movable zone start for each node Oct 2 19:18:01.111718 kernel: Early memory node ranges Oct 2 19:18:01.111891 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Oct 2 19:18:01.111908 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Oct 2 19:18:01.111924 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Oct 2 19:18:01.111940 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Oct 2 19:18:01.112081 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Oct 2 19:18:01.112098 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Oct 2 19:18:01.112114 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:18:01.112131 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Oct 2 19:18:01.112147 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Oct 2 19:18:01.112164 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Oct 2 19:18:01.112300 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Oct 2 19:18:01.112316 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:18:01.112332 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:18:01.112352 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:18:01.112369 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:18:01.112436 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:18:01.112453 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:18:01.112469 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:18:01.112485 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:18:01.112501 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:18:01.112517 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Oct 2 19:18:01.112540 kernel: Booting paravirtualized kernel on KVM Oct 2 19:18:01.112560 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:18:01.112577 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:18:01.112593 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:18:01.112609 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:18:01.112626 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:18:01.112642 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:18:01.112659 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:18:01.112675 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Oct 2 19:18:01.112692 kernel: Policy zone: Normal Oct 2 19:18:01.112713 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:18:01.112730 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:18:01.112747 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:18:01.112763 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:18:01.112779 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:18:01.112807 kernel: Memory: 7536584K/7860584K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 323740K reserved, 0K cma-reserved) Oct 2 19:18:01.112823 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:18:01.112839 kernel: Kernel/User page tables isolation: enabled Oct 2 19:18:01.112858 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:18:01.112874 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:18:01.112891 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:18:01.112907 kernel: rcu: RCU event tracing is enabled. Oct 2 19:18:01.112923 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:18:01.112939 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:18:01.112956 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:18:01.112971 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:18:01.112988 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:18:01.113008 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:18:01.113037 kernel: Console: colour dummy device 80x25 Oct 2 19:18:01.113055 kernel: printk: console [ttyS0] enabled Oct 2 19:18:01.113075 kernel: ACPI: Core revision 20210730 Oct 2 19:18:01.113092 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:18:01.113109 kernel: x2apic enabled Oct 2 19:18:01.113126 kernel: Switched APIC routing to physical x2apic. Oct 2 19:18:01.113143 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Oct 2 19:18:01.113161 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:18:01.113179 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Oct 2 19:18:01.113200 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Oct 2 19:18:01.113217 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Oct 2 19:18:01.113235 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:18:01.113252 kernel: Spectre V2 : Mitigation: IBRS Oct 2 19:18:01.113269 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:18:01.113286 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:18:01.113307 kernel: RETBleed: Mitigation: IBRS Oct 2 19:18:01.113324 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:18:01.113341 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Oct 2 19:18:01.113358 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:18:01.113375 kernel: MDS: Mitigation: Clear CPU buffers Oct 2 19:18:01.113393 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:18:01.113410 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:18:01.113427 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:18:01.113444 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:18:01.113464 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:18:01.113482 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 2 19:18:01.113499 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:18:01.113516 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:18:01.113540 kernel: LSM: Security Framework initializing Oct 2 19:18:01.113557 kernel: SELinux: Initializing. Oct 2 19:18:01.113575 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:18:01.113592 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:18:01.113610 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Oct 2 19:18:01.113631 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Oct 2 19:18:01.113648 kernel: signal: max sigframe size: 1776 Oct 2 19:18:01.113666 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:18:01.113683 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:18:01.113700 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:18:01.113717 kernel: x86: Booting SMP configuration: Oct 2 19:18:01.113735 kernel: .... node #0, CPUs: #1 Oct 2 19:18:01.113751 kernel: kvm-clock: cpu 1, msr 1c6f8a041, secondary cpu clock Oct 2 19:18:01.113769 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:18:01.116023 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:18:01.116055 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:18:01.116074 kernel: smpboot: Max logical packages: 1 Oct 2 19:18:01.116091 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Oct 2 19:18:01.116109 kernel: devtmpfs: initialized Oct 2 19:18:01.116257 kernel: x86/mm: Memory block size: 128MB Oct 2 19:18:01.116274 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Oct 2 19:18:01.116292 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:18:01.116309 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:18:01.116332 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:18:01.116474 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:18:01.116491 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:18:01.116508 kernel: audit: type=2000 audit(1696274280.214:1): state=initialized audit_enabled=0 res=1 Oct 2 19:18:01.116533 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:18:01.116550 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:18:01.116567 kernel: cpuidle: using governor menu Oct 2 19:18:01.116584 kernel: ACPI: bus type PCI registered Oct 2 19:18:01.116601 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:18:01.116747 kernel: dca service started, version 1.12.1 Oct 2 19:18:01.116763 kernel: PCI: Using configuration type 1 for base access Oct 2 19:18:01.116780 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:18:01.116813 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:18:01.116907 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:18:01.116923 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:18:01.116940 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:18:01.116957 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:18:01.116974 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:18:01.116996 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:18:01.117013 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:18:01.117030 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:18:01.117047 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:18:01.117063 kernel: ACPI: Interpreter enabled Oct 2 19:18:01.117080 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:18:01.117097 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:18:01.117115 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:18:01.117132 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:18:01.117153 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:18:01.117399 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:18:01.117583 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:18:01.117606 kernel: PCI host bridge to bus 0000:00 Oct 2 19:18:01.117779 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:18:01.122047 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:18:01.122203 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:18:01.122346 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Oct 2 19:18:01.122485 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:18:01.122674 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:18:01.122873 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Oct 2 19:18:01.123044 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:18:01.123214 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:18:01.123395 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Oct 2 19:18:01.123561 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Oct 2 19:18:01.123718 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Oct 2 19:18:01.124131 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:18:01.124623 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Oct 2 19:18:01.125057 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Oct 2 19:18:01.125261 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:18:01.125436 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Oct 2 19:18:01.125612 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Oct 2 19:18:01.125633 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:18:01.125651 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:18:01.125669 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:18:01.125685 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:18:01.125704 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:18:01.125726 kernel: iommu: Default domain type: Translated Oct 2 19:18:01.125742 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:18:01.125758 kernel: vgaarb: loaded Oct 2 19:18:01.125773 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:18:01.125802 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:18:01.132237 kernel: PTP clock support registered Oct 2 19:18:01.132258 kernel: Registered efivars operations Oct 2 19:18:01.132276 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:18:01.132294 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:18:01.132317 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Oct 2 19:18:01.132335 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Oct 2 19:18:01.132353 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Oct 2 19:18:01.132369 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Oct 2 19:18:01.132387 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:18:01.132404 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:18:01.132422 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:18:01.132439 kernel: pnp: PnP ACPI init Oct 2 19:18:01.132457 kernel: pnp: PnP ACPI: found 7 devices Oct 2 19:18:01.132478 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:18:01.132496 kernel: NET: Registered PF_INET protocol family Oct 2 19:18:01.132513 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:18:01.132538 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:18:01.132555 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:18:01.132573 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:18:01.132590 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:18:01.132608 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:18:01.132625 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:18:01.132647 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:18:01.132662 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:18:01.132680 kernel: NET: Registered PF_XDP protocol family Oct 2 19:18:01.132935 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:18:01.133087 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:18:01.133231 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:18:01.133372 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Oct 2 19:18:01.133548 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:18:01.133577 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:18:01.133595 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:18:01.133613 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Oct 2 19:18:01.133632 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:18:01.133650 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Oct 2 19:18:01.133667 kernel: clocksource: Switched to clocksource tsc Oct 2 19:18:01.133684 kernel: Initialise system trusted keyrings Oct 2 19:18:01.133702 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:18:01.133723 kernel: Key type asymmetric registered Oct 2 19:18:01.133740 kernel: Asymmetric key parser 'x509' registered Oct 2 19:18:01.133758 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:18:01.133774 kernel: io scheduler mq-deadline registered Oct 2 19:18:01.133804 kernel: io scheduler kyber registered Oct 2 19:18:01.133820 kernel: io scheduler bfq registered Oct 2 19:18:01.133836 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:18:01.133853 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:18:01.134023 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Oct 2 19:18:01.134052 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Oct 2 19:18:01.134214 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Oct 2 19:18:01.134238 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:18:01.134400 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Oct 2 19:18:01.134422 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:18:01.134439 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:18:01.134457 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:18:01.134495 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Oct 2 19:18:01.134512 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Oct 2 19:18:01.134693 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Oct 2 19:18:01.134718 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:18:01.134737 kernel: i8042: Warning: Keylock active Oct 2 19:18:01.134754 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:18:01.134772 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:18:01.134951 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:18:01.135102 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:18:01.135258 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:18:00 UTC (1696274280) Oct 2 19:18:01.135406 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:18:01.135429 kernel: intel_pstate: CPU model not supported Oct 2 19:18:01.135447 kernel: pstore: Registered efi as persistent store backend Oct 2 19:18:01.135465 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:18:01.135483 kernel: Segment Routing with IPv6 Oct 2 19:18:01.135501 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:18:01.135517 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:18:01.135542 kernel: Key type dns_resolver registered Oct 2 19:18:01.135563 kernel: IPI shorthand broadcast: enabled Oct 2 19:18:01.135580 kernel: sched_clock: Marking stable (729042955, 196397587)->(982625324, -57184782) Oct 2 19:18:01.135597 kernel: registered taskstats version 1 Oct 2 19:18:01.135614 kernel: Loading compiled-in X.509 certificates Oct 2 19:18:01.135632 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:18:01.135650 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:18:01.135668 kernel: Key type .fscrypt registered Oct 2 19:18:01.135685 kernel: Key type fscrypt-provisioning registered Oct 2 19:18:01.135702 kernel: pstore: Using crash dump compression: deflate Oct 2 19:18:01.135724 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:18:01.135741 kernel: ima: No architecture policies found Oct 2 19:18:01.135759 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:18:01.135777 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:18:01.135815 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:18:01.135832 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:18:01.135850 kernel: Run /init as init process Oct 2 19:18:01.135867 kernel: with arguments: Oct 2 19:18:01.135889 kernel: /init Oct 2 19:18:01.135904 kernel: with environment: Oct 2 19:18:01.135921 kernel: HOME=/ Oct 2 19:18:01.135937 kernel: TERM=linux Oct 2 19:18:01.135955 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:18:01.135976 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:18:01.135998 systemd[1]: Detected virtualization kvm. Oct 2 19:18:01.136015 systemd[1]: Detected architecture x86-64. Oct 2 19:18:01.136035 systemd[1]: Running in initrd. Oct 2 19:18:01.136054 systemd[1]: No hostname configured, using default hostname. Oct 2 19:18:01.136072 systemd[1]: Hostname set to . Oct 2 19:18:01.136092 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:18:01.136110 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:18:01.136128 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:18:01.136146 systemd[1]: Reached target cryptsetup.target. Oct 2 19:18:01.136164 systemd[1]: Reached target paths.target. Oct 2 19:18:01.136185 systemd[1]: Reached target slices.target. Oct 2 19:18:01.136203 systemd[1]: Reached target swap.target. Oct 2 19:18:01.136221 systemd[1]: Reached target timers.target. Oct 2 19:18:01.136241 systemd[1]: Listening on iscsid.socket. Oct 2 19:18:01.136260 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:18:01.136278 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:18:01.136297 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:18:01.136318 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:18:01.136336 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:18:01.136355 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:18:01.136373 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:18:01.136392 systemd[1]: Reached target sockets.target. Oct 2 19:18:01.136410 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:18:01.136428 systemd[1]: Finished network-cleanup.service. Oct 2 19:18:01.136446 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:18:01.136464 systemd[1]: Starting systemd-journald.service... Oct 2 19:18:01.136486 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:18:01.136503 systemd[1]: Starting systemd-resolved.service... Oct 2 19:18:01.136522 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:18:01.136566 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:18:01.136590 kernel: audit: type=1130 audit(1696274281.116:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.136609 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:18:01.136628 kernel: audit: type=1130 audit(1696274281.124:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.136650 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:18:01.136675 systemd-journald[189]: Journal started Oct 2 19:18:01.136765 systemd-journald[189]: Runtime Journal (/run/log/journal/7d3f9c99d1f4646f5b6e1fe88df72bc9) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:18:01.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.140946 systemd[1]: Started systemd-journald.service. Oct 2 19:18:01.154883 kernel: audit: type=1130 audit(1696274281.144:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.153016 systemd-modules-load[190]: Inserted module 'overlay' Oct 2 19:18:01.171935 kernel: audit: type=1130 audit(1696274281.153:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.171974 kernel: audit: type=1130 audit(1696274281.161:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.153879 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:18:01.159403 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:18:01.164699 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:18:01.204442 systemd-resolved[191]: Positive Trust Anchors: Oct 2 19:18:01.205783 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:18:01.208977 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:18:01.205942 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:18:01.213529 systemd-resolved[191]: Defaulting to hostname 'linux'. Oct 2 19:18:01.219932 kernel: Bridge firewalling registered Oct 2 19:18:01.214497 systemd-modules-load[190]: Inserted module 'br_netfilter' Oct 2 19:18:01.215447 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:18:01.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.232133 systemd[1]: Started systemd-resolved.service. Oct 2 19:18:01.259948 kernel: audit: type=1130 audit(1696274281.230:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.259988 kernel: SCSI subsystem initialized Oct 2 19:18:01.260011 kernel: audit: type=1130 audit(1696274281.238:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.260053 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:18:01.260085 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:18:01.260106 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:18:01.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.240057 systemd[1]: Reached target nss-lookup.target. Oct 2 19:18:01.248195 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:18:01.278929 kernel: audit: type=1130 audit(1696274281.266:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.262102 systemd-modules-load[190]: Inserted module 'dm_multipath' Oct 2 19:18:01.282927 dracut-cmdline[205]: dracut-dracut-053 Oct 2 19:18:01.282927 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:18:01.263088 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:18:01.269300 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:18:01.313944 kernel: audit: type=1130 audit(1696274281.305:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.286979 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:18:01.359815 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:18:01.373820 kernel: iscsi: registered transport (tcp) Oct 2 19:18:01.398930 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:18:01.399036 kernel: QLogic iSCSI HBA Driver Oct 2 19:18:01.445073 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:18:01.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.446683 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:18:01.505892 kernel: raid6: avx2x4 gen() 17850 MB/s Oct 2 19:18:01.522845 kernel: raid6: avx2x4 xor() 7520 MB/s Oct 2 19:18:01.539839 kernel: raid6: avx2x2 gen() 17986 MB/s Oct 2 19:18:01.556869 kernel: raid6: avx2x2 xor() 18417 MB/s Oct 2 19:18:01.574841 kernel: raid6: avx2x1 gen() 13773 MB/s Oct 2 19:18:01.591853 kernel: raid6: avx2x1 xor() 16012 MB/s Oct 2 19:18:01.608862 kernel: raid6: sse2x4 gen() 10848 MB/s Oct 2 19:18:01.625831 kernel: raid6: sse2x4 xor() 6698 MB/s Oct 2 19:18:01.642822 kernel: raid6: sse2x2 gen() 12068 MB/s Oct 2 19:18:01.659819 kernel: raid6: sse2x2 xor() 7457 MB/s Oct 2 19:18:01.676820 kernel: raid6: sse2x1 gen() 10582 MB/s Oct 2 19:18:01.694281 kernel: raid6: sse2x1 xor() 5178 MB/s Oct 2 19:18:01.694332 kernel: raid6: using algorithm avx2x2 gen() 17986 MB/s Oct 2 19:18:01.694358 kernel: raid6: .... xor() 18417 MB/s, rmw enabled Oct 2 19:18:01.695017 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:18:01.709829 kernel: xor: automatically using best checksumming function avx Oct 2 19:18:01.814831 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:18:01.826831 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:18:01.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.826000 audit: BPF prog-id=7 op=LOAD Oct 2 19:18:01.826000 audit: BPF prog-id=8 op=LOAD Oct 2 19:18:01.829137 systemd[1]: Starting systemd-udevd.service... Oct 2 19:18:01.845987 systemd-udevd[387]: Using default interface naming scheme 'v252'. Oct 2 19:18:01.853000 systemd[1]: Started systemd-udevd.service. Oct 2 19:18:01.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.858194 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:18:01.879491 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Oct 2 19:18:01.919262 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:18:01.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.924701 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:18:01.987397 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:18:01.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:02.061818 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:18:02.086819 kernel: scsi host0: Virtio SCSI HBA Oct 2 19:18:02.118832 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Oct 2 19:18:02.134886 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:18:02.134958 kernel: AES CTR mode by8 optimization enabled Oct 2 19:18:02.224807 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Oct 2 19:18:02.225253 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Oct 2 19:18:02.225502 kernel: sd 0:0:1:0: [sda] Write Protect is off Oct 2 19:18:02.239523 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Oct 2 19:18:02.240008 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:18:02.257604 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:18:02.257687 kernel: GPT:17805311 != 25165823 Oct 2 19:18:02.257710 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:18:02.263700 kernel: GPT:17805311 != 25165823 Oct 2 19:18:02.267405 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:18:02.277799 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:18:02.284816 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Oct 2 19:18:02.337817 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (448) Oct 2 19:18:02.352061 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:18:02.371448 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:18:02.375990 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:18:02.387214 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:18:02.414248 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:18:02.444075 systemd[1]: Starting disk-uuid.service... Oct 2 19:18:02.458170 disk-uuid[504]: Primary Header is updated. Oct 2 19:18:02.458170 disk-uuid[504]: Secondary Entries is updated. Oct 2 19:18:02.458170 disk-uuid[504]: Secondary Header is updated. Oct 2 19:18:02.483937 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:18:02.506897 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:18:02.519819 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:18:03.516826 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:18:03.517252 disk-uuid[505]: The operation has completed successfully. Oct 2 19:18:03.582918 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:18:03.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:03.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:03.583058 systemd[1]: Finished disk-uuid.service. Oct 2 19:18:03.605549 systemd[1]: Starting verity-setup.service... Oct 2 19:18:03.633996 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:18:03.727313 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:18:03.737307 systemd[1]: Finished verity-setup.service. Oct 2 19:18:03.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:03.745300 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:18:03.855836 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:18:03.856010 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:18:03.856396 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:18:03.912990 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:18:03.913038 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:18:03.913062 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:18:03.913084 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:18:03.857335 systemd[1]: Starting ignition-setup.service... Oct 2 19:18:03.895498 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:18:03.944469 systemd[1]: Finished ignition-setup.service. Oct 2 19:18:03.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:03.946205 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:18:04.016823 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:18:04.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.024000 audit: BPF prog-id=9 op=LOAD Oct 2 19:18:04.027119 systemd[1]: Starting systemd-networkd.service... Oct 2 19:18:04.062154 systemd-networkd[679]: lo: Link UP Oct 2 19:18:04.062172 systemd-networkd[679]: lo: Gained carrier Oct 2 19:18:04.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.063087 systemd-networkd[679]: Enumeration completed Oct 2 19:18:04.063232 systemd[1]: Started systemd-networkd.service. Oct 2 19:18:04.063657 systemd-networkd[679]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:18:04.066133 systemd-networkd[679]: eth0: Link UP Oct 2 19:18:04.066141 systemd-networkd[679]: eth0: Gained carrier Oct 2 19:18:04.070267 systemd[1]: Reached target network.target. Oct 2 19:18:04.077930 systemd-networkd[679]: eth0: DHCPv4 address 10.128.0.6/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:18:04.124339 systemd[1]: Starting iscsiuio.service... Oct 2 19:18:04.167147 systemd[1]: Started iscsiuio.service. Oct 2 19:18:04.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.169060 systemd[1]: Starting iscsid.service... Oct 2 19:18:04.194987 iscsid[689]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:18:04.194987 iscsid[689]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:18:04.194987 iscsid[689]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:18:04.194987 iscsid[689]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:18:04.194987 iscsid[689]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:18:04.194987 iscsid[689]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:18:04.194987 iscsid[689]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:18:04.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.188226 systemd[1]: Started iscsid.service. Oct 2 19:18:04.268590 ignition[611]: Ignition 2.14.0 Oct 2 19:18:04.203610 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:18:04.268603 ignition[611]: Stage: fetch-offline Oct 2 19:18:04.263322 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:18:04.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.268816 ignition[611]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:04.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.271296 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:18:04.268871 ignition[611]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:04.304970 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:18:04.288189 ignition[611]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:04.322995 systemd[1]: Reached target remote-fs.target. Oct 2 19:18:04.288501 ignition[611]: parsed url from cmdline: "" Oct 2 19:18:04.337372 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:18:04.288507 ignition[611]: no config URL provided Oct 2 19:18:04.357385 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:18:04.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.288514 ignition[611]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:18:04.364439 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:18:04.288526 ignition[611]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:18:04.387637 systemd[1]: Starting ignition-fetch.service... Oct 2 19:18:04.288535 ignition[611]: failed to fetch config: resource requires networking Oct 2 19:18:04.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.444972 unknown[704]: fetched base config from "system" Oct 2 19:18:04.288939 ignition[611]: Ignition finished successfully Oct 2 19:18:04.444986 unknown[704]: fetched base config from "system" Oct 2 19:18:04.399970 ignition[704]: Ignition 2.14.0 Oct 2 19:18:04.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.444995 unknown[704]: fetched user config from "gcp" Oct 2 19:18:04.399979 ignition[704]: Stage: fetch Oct 2 19:18:04.450085 systemd[1]: Finished ignition-fetch.service. Oct 2 19:18:04.400124 ignition[704]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:04.453269 systemd[1]: Starting ignition-kargs.service... Oct 2 19:18:04.400154 ignition[704]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:04.490267 systemd[1]: Finished ignition-kargs.service. Oct 2 19:18:04.410571 ignition[704]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:04.513511 systemd[1]: Starting ignition-disks.service... Oct 2 19:18:04.410766 ignition[704]: parsed url from cmdline: "" Oct 2 19:18:04.544285 systemd[1]: Finished ignition-disks.service. Oct 2 19:18:04.410771 ignition[704]: no config URL provided Oct 2 19:18:04.560406 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:18:04.410779 ignition[704]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:18:04.574092 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:18:04.410813 ignition[704]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:18:04.590026 systemd[1]: Reached target local-fs.target. Oct 2 19:18:04.410864 ignition[704]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Oct 2 19:18:04.601009 systemd[1]: Reached target sysinit.target. Oct 2 19:18:04.417632 ignition[704]: GET result: OK Oct 2 19:18:04.601131 systemd[1]: Reached target basic.target. Oct 2 19:18:04.417754 ignition[704]: parsing config with SHA512: 11b7b4b09a537acf3c295d93c89a86e4be556c2bc6a71346c96500b26178e55aafe2071426b0599584e8f88b430ae73b387dae218961ff4cd25c4f5303e236f3 Oct 2 19:18:04.615450 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:18:04.448323 ignition[704]: fetch: fetch complete Oct 2 19:18:04.448334 ignition[704]: fetch: fetch passed Oct 2 19:18:04.448420 ignition[704]: Ignition finished successfully Oct 2 19:18:04.466998 ignition[710]: Ignition 2.14.0 Oct 2 19:18:04.467007 ignition[710]: Stage: kargs Oct 2 19:18:04.467143 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:04.467172 ignition[710]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:04.474544 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:04.475875 ignition[710]: kargs: kargs passed Oct 2 19:18:04.475947 ignition[710]: Ignition finished successfully Oct 2 19:18:04.525038 ignition[716]: Ignition 2.14.0 Oct 2 19:18:04.525050 ignition[716]: Stage: disks Oct 2 19:18:04.525232 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:04.525277 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:04.533329 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:04.534766 ignition[716]: disks: disks passed Oct 2 19:18:04.534841 ignition[716]: Ignition finished successfully Oct 2 19:18:04.657905 systemd-fsck[724]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:18:04.829837 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:18:04.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:04.831132 systemd[1]: Mounting sysroot.mount... Oct 2 19:18:04.862987 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:18:04.871286 systemd[1]: Mounted sysroot.mount. Oct 2 19:18:04.871632 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:18:04.897642 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:18:04.915508 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:18:04.915598 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:18:04.915647 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:18:04.937583 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:18:04.975452 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:18:04.998837 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (730) Oct 2 19:18:05.017575 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:18:05.017657 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:18:05.017685 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:18:05.012723 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:18:05.024039 initrd-setup-root[735]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:18:05.030905 initrd-setup-root[759]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:18:05.063086 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:18:05.059296 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:18:05.082014 initrd-setup-root[767]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:18:05.092691 initrd-setup-root[775]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:18:05.126953 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:18:05.166988 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:18:05.167031 kernel: audit: type=1130 audit(1696274285.125:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.128438 systemd[1]: Starting ignition-mount.service... Oct 2 19:18:05.175153 systemd[1]: Starting sysroot-boot.service... Oct 2 19:18:05.189305 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:18:05.189464 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:18:05.217989 ignition[796]: INFO : Ignition 2.14.0 Oct 2 19:18:05.217989 ignition[796]: INFO : Stage: mount Oct 2 19:18:05.217989 ignition[796]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:05.217989 ignition[796]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:05.217989 ignition[796]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:05.332989 kernel: audit: type=1130 audit(1696274285.224:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.333036 kernel: audit: type=1130 audit(1696274285.275:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.221742 systemd[1]: Finished sysroot-boot.service. Oct 2 19:18:05.372968 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (806) Oct 2 19:18:05.373009 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:18:05.373030 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:18:05.373052 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:18:05.373081 ignition[796]: INFO : mount: mount passed Oct 2 19:18:05.373081 ignition[796]: INFO : Ignition finished successfully Oct 2 19:18:05.399988 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:18:05.226512 systemd[1]: Finished ignition-mount.service. Oct 2 19:18:05.278518 systemd[1]: Starting ignition-files.service... Oct 2 19:18:05.413979 ignition[825]: INFO : Ignition 2.14.0 Oct 2 19:18:05.413979 ignition[825]: INFO : Stage: files Oct 2 19:18:05.413979 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:05.413979 ignition[825]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:05.413979 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:05.413979 ignition[825]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:18:05.489952 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (830) Oct 2 19:18:05.322144 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:18:05.498977 ignition[825]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:18:05.498977 ignition[825]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:18:05.498977 ignition[825]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:18:05.498977 ignition[825]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:18:05.498977 ignition[825]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3083622064" Oct 2 19:18:05.498977 ignition[825]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3083622064": device or resource busy Oct 2 19:18:05.498977 ignition[825]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3083622064", trying btrfs: device or resource busy Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3083622064" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3083622064" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3083622064" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3083622064" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:18:05.498977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:18:05.385072 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:18:05.429953 systemd-networkd[679]: eth0: Gained IPv6LL Oct 2 19:18:05.431259 unknown[825]: wrote ssh authorized keys file for user: core Oct 2 19:18:05.851682 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:18:06.115464 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:18:06.139977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:18:06.139977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:18:06.139977 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:18:06.283592 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Oct 2 19:18:06.404096 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513391443" Oct 2 19:18:06.428979 ignition[825]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513391443": device or resource busy Oct 2 19:18:06.428979 ignition[825]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2513391443", trying btrfs: device or resource busy Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513391443" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2513391443" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem2513391443" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2513391443" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:18:06.428979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:18:06.652969 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Oct 2 19:18:06.836423 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:18:06.860962 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:18:06.860962 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:18:06.860962 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:18:06.909971 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Oct 2 19:18:07.550003 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:18:07.574001 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:18:07.574001 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:18:07.574001 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:18:07.622979 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Oct 2 19:18:07.955866 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465704741" Oct 2 19:18:07.979963 ignition[825]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465704741": device or resource busy Oct 2 19:18:07.979963 ignition[825]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1465704741", trying btrfs: device or resource busy Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465704741" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1465704741" Oct 2 19:18:07.979963 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem1465704741" Oct 2 19:18:08.433001 kernel: audit: type=1130 audit(1696274288.018:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.433094 kernel: audit: type=1130 audit(1696274288.113:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.433120 kernel: audit: type=1130 audit(1696274288.158:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.433142 kernel: audit: type=1131 audit(1696274288.158:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.433162 kernel: audit: type=1130 audit(1696274288.283:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.433188 kernel: audit: type=1131 audit(1696274288.283:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:07.974956 systemd[1]: mnt-oem1465704741.mount: Deactivated successfully. Oct 2 19:18:08.470979 kernel: audit: type=1130 audit(1696274288.440:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem1465704741" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4289126126" Oct 2 19:18:08.471134 ignition[825]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4289126126": device or resource busy Oct 2 19:18:08.471134 ignition[825]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4289126126", trying btrfs: device or resource busy Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4289126126" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4289126126" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem4289126126" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem4289126126" Oct 2 19:18:08.471134 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:18:08.471134 ignition[825]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:18:08.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.002732 systemd[1]: Finished ignition-files.service. Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1e): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(1e): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(20): [started] processing unit "prepare-critools.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(20): op(21): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(20): op(21): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(20): [finished] processing unit "prepare-critools.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(23): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(23): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(24): [started] setting preset to enabled for "oem-gce.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(24): [finished] setting preset to enabled for "oem-gce.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(25): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(25): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(26): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:08.820303 ignition[825]: INFO : files: op(26): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:08.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.030377 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:18:09.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.216173 initrd-setup-root-after-ignition[848]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:18:09.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.237289 iscsid[689]: iscsid shutting down. Oct 2 19:18:09.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.252197 ignition[825]: INFO : files: createResultFile: createFiles: op(27): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:09.252197 ignition[825]: INFO : files: createResultFile: createFiles: op(27): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:09.252197 ignition[825]: INFO : files: files passed Oct 2 19:18:09.252197 ignition[825]: INFO : Ignition finished successfully Oct 2 19:18:09.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.065993 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:18:08.067240 systemd[1]: Starting ignition-quench.service... Oct 2 19:18:08.090365 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:18:08.138294 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:18:08.138416 systemd[1]: Finished ignition-quench.service. Oct 2 19:18:09.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.160220 systemd[1]: Reached target ignition-complete.target. Oct 2 19:18:09.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.238200 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:18:09.446060 ignition[863]: INFO : Ignition 2.14.0 Oct 2 19:18:09.446060 ignition[863]: INFO : Stage: umount Oct 2 19:18:09.446060 ignition[863]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:09.446060 ignition[863]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Oct 2 19:18:09.446060 ignition[863]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Oct 2 19:18:09.446060 ignition[863]: INFO : umount: umount passed Oct 2 19:18:09.446060 ignition[863]: INFO : Ignition finished successfully Oct 2 19:18:09.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.268735 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:18:08.268882 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:18:09.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.285239 systemd[1]: Reached target initrd-fs.target. Oct 2 19:18:09.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.591000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:18:08.374137 systemd[1]: Reached target initrd.target. Oct 2 19:18:08.391282 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:18:08.392437 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:18:08.413444 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:18:09.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.443608 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:18:09.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.487243 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:18:09.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.517316 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:18:08.558356 systemd[1]: Stopped target timers.target. Oct 2 19:18:09.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.575342 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:18:08.575530 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:18:08.600579 systemd[1]: Stopped target initrd.target. Oct 2 19:18:09.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.627430 systemd[1]: Stopped target basic.target. Oct 2 19:18:09.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.671270 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:18:09.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.686344 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:18:08.708383 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:18:09.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.732366 systemd[1]: Stopped target remote-fs.target. Oct 2 19:18:09.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.770217 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:18:09.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:09.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:08.791160 systemd[1]: Stopped target sysinit.target. Oct 2 19:18:08.812181 systemd[1]: Stopped target local-fs.target. Oct 2 19:18:08.828164 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:18:08.847201 systemd[1]: Stopped target swap.target. Oct 2 19:18:08.858321 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:18:08.858510 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:18:08.883297 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:18:09.951997 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Oct 2 19:18:08.901319 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:18:08.901517 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:18:08.943445 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:18:08.943626 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:18:08.980373 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:18:08.980548 systemd[1]: Stopped ignition-files.service. Oct 2 19:18:09.017422 systemd[1]: Stopping ignition-mount.service... Oct 2 19:18:09.043521 systemd[1]: Stopping iscsid.service... Oct 2 19:18:09.067931 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:18:09.068200 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:18:09.091548 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:18:09.110959 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:18:09.111261 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:18:09.124474 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:18:09.124660 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:18:09.168039 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:18:09.168992 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:18:09.169110 systemd[1]: Stopped iscsid.service. Oct 2 19:18:09.184736 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:18:09.184875 systemd[1]: Stopped ignition-mount.service. Oct 2 19:18:09.206817 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:18:09.206998 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:18:09.223648 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:18:09.223856 systemd[1]: Stopped ignition-disks.service. Oct 2 19:18:09.245082 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:18:09.245165 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:18:09.261104 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:18:09.261189 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:18:09.276293 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:18:09.276363 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:18:09.306084 systemd[1]: Stopped target paths.target. Oct 2 19:18:09.319002 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:18:09.322935 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:18:09.338025 systemd[1]: Stopped target slices.target. Oct 2 19:18:09.360990 systemd[1]: Stopped target sockets.target. Oct 2 19:18:09.376133 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:18:09.376202 systemd[1]: Closed iscsid.socket. Oct 2 19:18:09.391138 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:18:09.391212 systemd[1]: Stopped ignition-setup.service. Oct 2 19:18:09.408160 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:18:09.408232 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:18:09.423244 systemd[1]: Stopping iscsiuio.service... Oct 2 19:18:09.438803 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:18:09.438952 systemd[1]: Stopped iscsiuio.service. Oct 2 19:18:09.453434 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:18:09.453545 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:18:09.474161 systemd[1]: Stopped target network.target. Oct 2 19:18:09.511048 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:18:09.511134 systemd[1]: Closed iscsiuio.socket. Oct 2 19:18:09.529282 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:18:09.533932 systemd-networkd[679]: eth0: DHCPv6 lease lost Oct 2 19:18:09.961000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:18:09.543245 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:18:09.559393 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:18:09.559535 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:18:09.578826 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:18:09.578962 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:18:09.593651 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:18:09.593702 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:18:09.610005 systemd[1]: Stopping network-cleanup.service... Oct 2 19:18:09.634159 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:18:09.634260 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:18:09.651259 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:18:09.651332 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:18:09.667301 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:18:09.667367 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:18:09.684377 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:18:09.699593 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:18:09.700271 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:18:09.700422 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:18:09.716366 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:18:09.716458 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:18:09.731175 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:18:09.731228 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:18:09.749126 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:18:09.749207 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:18:09.766183 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:18:09.766256 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:18:09.783170 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:18:09.783239 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:18:09.799211 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:18:09.815975 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:18:09.816097 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:18:09.834742 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:18:09.834963 systemd[1]: Stopped network-cleanup.service. Oct 2 19:18:09.852395 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:18:09.852514 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:18:09.869404 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:18:09.888130 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:18:09.916623 systemd[1]: Switching root. Oct 2 19:18:09.965331 systemd-journald[189]: Journal stopped Oct 2 19:18:14.811676 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:18:14.811762 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:18:14.811813 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:18:14.811841 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:18:14.811861 kernel: SELinux: policy capability open_perms=1 Oct 2 19:18:14.811875 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:18:14.811894 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:18:14.811915 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:18:14.811929 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:18:14.811943 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:18:14.811957 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:18:14.811971 kernel: kauditd_printk_skb: 35 callbacks suppressed Oct 2 19:18:14.811998 kernel: audit: type=1403 audit(1696274290.299:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:18:14.812024 systemd[1]: Successfully loaded SELinux policy in 122.068ms. Oct 2 19:18:14.812054 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.914ms. Oct 2 19:18:14.812070 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:18:14.812085 systemd[1]: Detected virtualization kvm. Oct 2 19:18:14.812100 systemd[1]: Detected architecture x86-64. Oct 2 19:18:14.812115 systemd[1]: Detected first boot. Oct 2 19:18:14.812130 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:18:14.812148 kernel: audit: type=1400 audit(1696274290.469:80): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:14.812162 kernel: audit: type=1400 audit(1696274290.469:81): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:14.812176 kernel: audit: type=1334 audit(1696274290.490:82): prog-id=10 op=LOAD Oct 2 19:18:14.812195 kernel: audit: type=1334 audit(1696274290.490:83): prog-id=10 op=UNLOAD Oct 2 19:18:14.812208 kernel: audit: type=1334 audit(1696274290.511:84): prog-id=11 op=LOAD Oct 2 19:18:14.812222 kernel: audit: type=1334 audit(1696274290.511:85): prog-id=11 op=UNLOAD Oct 2 19:18:14.812237 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:18:14.812260 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:14.812276 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:14.812295 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:14.812310 kernel: audit: type=1334 audit(1696274293.957:86): prog-id=12 op=LOAD Oct 2 19:18:14.812324 kernel: audit: type=1334 audit(1696274293.957:87): prog-id=3 op=UNLOAD Oct 2 19:18:14.812337 kernel: audit: type=1334 audit(1696274293.971:88): prog-id=13 op=LOAD Oct 2 19:18:14.812351 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:18:14.812366 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:18:14.812385 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:18:14.812399 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:18:14.812414 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:18:14.812429 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:18:14.812444 systemd[1]: Created slice system-getty.slice. Oct 2 19:18:14.812459 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:18:14.812473 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:18:14.812491 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:18:14.812506 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:18:14.812520 systemd[1]: Created slice user.slice. Oct 2 19:18:14.812535 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:18:14.812550 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:18:14.812568 systemd[1]: Set up automount boot.automount. Oct 2 19:18:14.812583 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:18:14.812599 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:18:14.812614 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:18:14.812632 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:18:14.812647 systemd[1]: Reached target integritysetup.target. Oct 2 19:18:14.812665 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:18:14.812695 systemd[1]: Reached target remote-fs.target. Oct 2 19:18:14.812725 systemd[1]: Reached target slices.target. Oct 2 19:18:14.812753 systemd[1]: Reached target swap.target. Oct 2 19:18:14.812777 systemd[1]: Reached target torcx.target. Oct 2 19:18:14.812813 systemd[1]: Reached target veritysetup.target. Oct 2 19:18:14.812838 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:18:14.812853 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:18:14.812872 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:18:14.812887 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:18:14.812901 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:18:14.812916 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:18:14.812930 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:18:14.812944 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:18:14.812964 systemd[1]: Mounting media.mount... Oct 2 19:18:14.812989 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:14.813004 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:18:14.813036 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:18:14.813050 systemd[1]: Mounting tmp.mount... Oct 2 19:18:14.813069 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:18:14.813084 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:18:14.813098 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:18:14.813112 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:18:14.813131 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:18:14.813147 systemd[1]: Starting modprobe@drm.service... Oct 2 19:18:14.813162 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:18:14.813180 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:18:14.813194 systemd[1]: Starting modprobe@loop.service... Oct 2 19:18:14.813208 kernel: fuse: init (API version 7.34) Oct 2 19:18:14.813223 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:18:14.813238 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:18:14.813252 kernel: loop: module loaded Oct 2 19:18:14.813266 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:18:14.813280 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:18:14.813295 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:18:14.813312 systemd[1]: Stopped systemd-journald.service. Oct 2 19:18:14.813327 systemd[1]: Starting systemd-journald.service... Oct 2 19:18:14.813342 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:18:14.813358 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:18:14.813377 systemd-journald[987]: Journal started Oct 2 19:18:14.813459 systemd-journald[987]: Runtime Journal (/run/log/journal/7d3f9c99d1f4646f5b6e1fe88df72bc9) is 8.0M, max 148.8M, 140.8M free. Oct 2 19:18:10.299000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:18:10.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:10.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:10.490000 audit: BPF prog-id=10 op=LOAD Oct 2 19:18:10.490000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:18:10.511000 audit: BPF prog-id=11 op=LOAD Oct 2 19:18:10.511000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:18:13.957000 audit: BPF prog-id=12 op=LOAD Oct 2 19:18:13.957000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:18:13.971000 audit: BPF prog-id=13 op=LOAD Oct 2 19:18:13.978000 audit: BPF prog-id=14 op=LOAD Oct 2 19:18:13.978000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:18:13.978000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:18:13.979000 audit: BPF prog-id=15 op=LOAD Oct 2 19:18:13.979000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:18:13.979000 audit: BPF prog-id=16 op=LOAD Oct 2 19:18:13.979000 audit: BPF prog-id=17 op=LOAD Oct 2 19:18:13.979000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:18:13.979000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:18:13.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.995000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:18:14.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.763000 audit: BPF prog-id=18 op=LOAD Oct 2 19:18:14.763000 audit: BPF prog-id=19 op=LOAD Oct 2 19:18:14.763000 audit: BPF prog-id=20 op=LOAD Oct 2 19:18:14.763000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:18:14.763000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:18:14.798000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:18:14.798000 audit[987]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd0b89a930 a2=4000 a3=7ffd0b89a9cc items=0 ppid=1 pid=987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:14.798000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:18:13.956518 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:18:10.723136 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:13.982268 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:18:10.724392 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:10.724429 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:10.724484 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:18:10.724503 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:18:10.724559 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:18:10.724584 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:18:10.724922 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:18:10.724996 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:10.725021 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:10.726337 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:18:10.726403 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:18:10.726438 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:18:10.726466 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:18:10.726497 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:18:10.726524 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:18:13.343615 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:13.343999 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:13.344149 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:13.344440 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:13.344501 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:18:13.344580 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2023-10-02T19:18:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:18:14.823841 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:18:14.838815 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:18:14.858280 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:18:14.858483 systemd[1]: Stopped verity-setup.service. Oct 2 19:18:14.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.877819 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:14.886843 systemd[1]: Started systemd-journald.service. Oct 2 19:18:14.896233 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:18:14.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.903133 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:18:14.910142 systemd[1]: Mounted media.mount. Oct 2 19:18:14.917134 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:18:14.926160 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:18:14.935210 systemd[1]: Mounted tmp.mount. Oct 2 19:18:14.942330 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:18:14.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.951394 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:18:14.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.960407 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:18:14.960680 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:18:14.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.969430 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:18:14.969676 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:18:14.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.978392 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:18:14.978644 systemd[1]: Finished modprobe@drm.service. Oct 2 19:18:14.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.987492 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:18:14.987717 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:18:14.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.996451 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:18:14.996687 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:18:15.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.005429 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:18:15.005676 systemd[1]: Finished modprobe@loop.service. Oct 2 19:18:15.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.014489 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:18:15.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.023424 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:18:15.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.032406 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:18:15.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.041436 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:18:15.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.050764 systemd[1]: Reached target network-pre.target. Oct 2 19:18:15.060592 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:18:15.070450 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:18:15.077965 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:18:15.081074 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:18:15.090705 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:18:15.099984 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:18:15.101893 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:18:15.104945 systemd-journald[987]: Time spent on flushing to /var/log/journal/7d3f9c99d1f4646f5b6e1fe88df72bc9 is 75.600ms for 1153 entries. Oct 2 19:18:15.104945 systemd-journald[987]: System Journal (/var/log/journal/7d3f9c99d1f4646f5b6e1fe88df72bc9) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:18:15.207721 systemd-journald[987]: Received client request to flush runtime journal. Oct 2 19:18:15.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.117023 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:18:15.118962 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:18:15.127977 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:18:15.136495 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:18:15.210246 udevadm[1001]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:18:15.148655 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:18:15.157187 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:18:15.166364 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:18:15.175424 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:18:15.188229 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:18:15.209113 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:18:15.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.219568 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:18:15.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.799628 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:18:15.836387 kernel: kauditd_printk_skb: 49 callbacks suppressed Oct 2 19:18:15.836534 kernel: audit: type=1130 audit(1696274295.806:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.834000 audit: BPF prog-id=21 op=LOAD Oct 2 19:18:15.837665 systemd[1]: Starting systemd-udevd.service... Oct 2 19:18:15.843736 kernel: audit: type=1334 audit(1696274295.834:137): prog-id=21 op=LOAD Oct 2 19:18:15.843879 kernel: audit: type=1334 audit(1696274295.834:138): prog-id=22 op=LOAD Oct 2 19:18:15.843916 kernel: audit: type=1334 audit(1696274295.834:139): prog-id=7 op=UNLOAD Oct 2 19:18:15.843954 kernel: audit: type=1334 audit(1696274295.834:140): prog-id=8 op=UNLOAD Oct 2 19:18:15.834000 audit: BPF prog-id=22 op=LOAD Oct 2 19:18:15.834000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:18:15.834000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:18:15.885643 systemd-udevd[1004]: Using default interface naming scheme 'v252'. Oct 2 19:18:15.949167 systemd[1]: Started systemd-udevd.service. Oct 2 19:18:15.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.980816 kernel: audit: type=1130 audit(1696274295.956:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.987543 systemd[1]: Starting systemd-networkd.service... Oct 2 19:18:15.984000 audit: BPF prog-id=23 op=LOAD Oct 2 19:18:15.997813 kernel: audit: type=1334 audit(1696274295.984:142): prog-id=23 op=LOAD Oct 2 19:18:16.017447 kernel: audit: type=1334 audit(1696274296.006:143): prog-id=24 op=LOAD Oct 2 19:18:16.006000 audit: BPF prog-id=24 op=LOAD Oct 2 19:18:16.017337 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:18:16.014000 audit: BPF prog-id=25 op=LOAD Oct 2 19:18:16.027870 kernel: audit: type=1334 audit(1696274296.014:144): prog-id=25 op=LOAD Oct 2 19:18:16.014000 audit: BPF prog-id=26 op=LOAD Oct 2 19:18:16.038816 kernel: audit: type=1334 audit(1696274296.014:145): prog-id=26 op=LOAD Oct 2 19:18:16.052203 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:18:16.103076 systemd[1]: Started systemd-userdbd.service. Oct 2 19:18:16.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.167827 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Oct 2 19:18:16.266696 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:18:16.266865 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Oct 2 19:18:16.258634 systemd-networkd[1014]: lo: Link UP Oct 2 19:18:16.258650 systemd-networkd[1014]: lo: Gained carrier Oct 2 19:18:16.259416 systemd-networkd[1014]: Enumeration completed Oct 2 19:18:16.259778 systemd[1]: Started systemd-networkd.service. Oct 2 19:18:16.261338 systemd-networkd[1014]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:18:16.273881 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:18:16.274170 systemd-networkd[1014]: eth0: Link UP Oct 2 19:18:16.274184 systemd-networkd[1014]: eth0: Gained carrier Oct 2 19:18:16.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.285066 systemd-networkd[1014]: eth0: DHCPv4 address 10.128.0.6/32, gateway 10.128.0.1 acquired from 169.254.169.254 Oct 2 19:18:16.310823 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1017) Oct 2 19:18:16.226000 audit[1018]: AVC avc: denied { confidentiality } for pid=1018 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:18:16.226000 audit[1018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5650ccda8720 a1=32194 a2=7f32e4d30bc5 a3=5 items=106 ppid=1004 pid=1018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:16.226000 audit: CWD cwd="/" Oct 2 19:18:16.226000 audit: PATH item=0 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=1 name=(null) inode=14162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=2 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=3 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=4 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=5 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=6 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=7 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=8 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=9 name=(null) inode=14166 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=10 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=11 name=(null) inode=14167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=12 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=13 name=(null) inode=14168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=14 name=(null) inode=14164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=15 name=(null) inode=14169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=16 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=17 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=18 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=19 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=20 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=21 name=(null) inode=14172 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=22 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=23 name=(null) inode=14173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=24 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=25 name=(null) inode=14174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=26 name=(null) inode=14170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=27 name=(null) inode=14175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=28 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=29 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=30 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=31 name=(null) inode=14177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=32 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=33 name=(null) inode=14178 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=34 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=35 name=(null) inode=14179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=36 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=37 name=(null) inode=14180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=38 name=(null) inode=14176 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=39 name=(null) inode=14181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=40 name=(null) inode=14139 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=41 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=42 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=43 name=(null) inode=14183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=44 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=45 name=(null) inode=14184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=46 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=47 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=48 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=49 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=50 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=51 name=(null) inode=14187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=53 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=54 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=55 name=(null) inode=14189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=56 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=57 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=58 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=59 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=60 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=61 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=62 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=63 name=(null) inode=14193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=64 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=65 name=(null) inode=14194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=66 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=67 name=(null) inode=14195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=68 name=(null) inode=14191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=69 name=(null) inode=14196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=70 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=71 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=72 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=73 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=74 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=75 name=(null) inode=14199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=76 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=77 name=(null) inode=14200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=78 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=79 name=(null) inode=14201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=80 name=(null) inode=14197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=81 name=(null) inode=14202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=82 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=83 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=84 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=85 name=(null) inode=14204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=86 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=87 name=(null) inode=14205 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=88 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=89 name=(null) inode=14206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=90 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=91 name=(null) inode=14207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=92 name=(null) inode=14203 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=93 name=(null) inode=14208 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=94 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=95 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=96 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=97 name=(null) inode=14210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=98 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=99 name=(null) inode=14211 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=100 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=101 name=(null) inode=14212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=102 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=103 name=(null) inode=14213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=104 name=(null) inode=14209 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PATH item=105 name=(null) inode=14214 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:16.226000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:18:16.364816 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Oct 2 19:18:16.386855 kernel: EDAC MC: Ver: 3.0.0 Oct 2 19:18:16.398855 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:18:16.400731 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:18:16.415830 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:18:16.431413 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:18:16.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.441754 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:18:16.474044 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:16.503291 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:18:16.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.512168 systemd[1]: Reached target cryptsetup.target. Oct 2 19:18:16.522503 systemd[1]: Starting lvm2-activation.service... Oct 2 19:18:16.528870 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:16.556259 systemd[1]: Finished lvm2-activation.service. Oct 2 19:18:16.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.565205 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:18:16.574037 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:18:16.574104 systemd[1]: Reached target local-fs.target. Oct 2 19:18:16.583017 systemd[1]: Reached target machines.target. Oct 2 19:18:16.593756 systemd[1]: Starting ldconfig.service... Oct 2 19:18:16.602414 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:18:16.602530 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:16.604166 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:18:16.612769 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:18:16.624739 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:18:16.625198 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:16.625308 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:16.627334 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:18:16.628535 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Oct 2 19:18:16.631991 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:18:16.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.652173 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:18:16.673190 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:18:16.687688 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:18:16.710856 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:18:16.811180 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) Oct 2 19:18:16.811180 systemd-fsck[1052]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:18:16.814215 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:18:16.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:16.825881 systemd[1]: Mounting boot.mount... Oct 2 19:18:16.878277 systemd[1]: Mounted boot.mount. Oct 2 19:18:16.910754 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:18:16.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.025724 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:18:17.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.036882 systemd[1]: Starting audit-rules.service... Oct 2 19:18:17.048033 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:18:17.058841 systemd[1]: Starting oem-gce-enable-oslogin.service... Oct 2 19:18:17.068679 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:18:17.076000 audit: BPF prog-id=27 op=LOAD Oct 2 19:18:17.079328 systemd[1]: Starting systemd-resolved.service... Oct 2 19:18:17.086000 audit: BPF prog-id=28 op=LOAD Oct 2 19:18:17.089447 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:18:17.098692 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:18:17.106778 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:18:17.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.115649 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:18:17.156000 audit[1066]: SYSTEM_BOOT pid=1066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.161975 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:18:17.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.190197 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Oct 2 19:18:17.190426 systemd[1]: Finished oem-gce-enable-oslogin.service. Oct 2 19:18:17.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.232994 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:18:17.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.354893 augenrules[1088]: No rules Oct 2 19:18:17.352000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:18:17.352000 audit[1088]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddfa2d8d0 a2=420 a3=0 items=0 ppid=1055 pid=1088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:17.352000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:18:17.355893 systemd[1]: Finished audit-rules.service. Oct 2 19:18:17.767262 systemd-timesyncd[1065]: Contacted time server 169.254.169.254:123 (169.254.169.254). Oct 2 19:18:17.767345 systemd-timesyncd[1065]: Initial clock synchronization to Mon 2023-10-02 19:18:17.767090 UTC. Oct 2 19:18:17.767481 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:18:17.768972 systemd-resolved[1064]: Positive Trust Anchors: Oct 2 19:18:17.768995 systemd-resolved[1064]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:18:17.769053 systemd-resolved[1064]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:18:17.777762 systemd[1]: Reached target time-set.target. Oct 2 19:18:17.813947 systemd-resolved[1064]: Defaulting to hostname 'linux'. Oct 2 19:18:17.817229 systemd[1]: Started systemd-resolved.service. Oct 2 19:18:17.825463 systemd[1]: Reached target network.target. Oct 2 19:18:17.834335 systemd[1]: Reached target nss-lookup.target. Oct 2 19:18:18.055563 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:18:18.098518 systemd[1]: Finished ldconfig.service. Oct 2 19:18:18.107287 systemd[1]: Starting systemd-update-done.service... Oct 2 19:18:18.116755 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:18:18.119107 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:18:18.127710 systemd[1]: Finished systemd-update-done.service. Oct 2 19:18:18.136553 systemd[1]: Reached target sysinit.target. Oct 2 19:18:18.145480 systemd[1]: Started motdgen.path. Oct 2 19:18:18.152428 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:18:18.162543 systemd[1]: Started logrotate.timer. Oct 2 19:18:18.169569 systemd[1]: Started mdadm.timer. Oct 2 19:18:18.176359 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:18:18.185341 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:18:18.185407 systemd[1]: Reached target paths.target. Oct 2 19:18:18.192337 systemd[1]: Reached target timers.target. Oct 2 19:18:18.199789 systemd[1]: Listening on dbus.socket. Oct 2 19:18:18.208696 systemd[1]: Starting docker.socket... Oct 2 19:18:18.219262 systemd[1]: Listening on sshd.socket. Oct 2 19:18:18.226441 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:18.227201 systemd[1]: Listening on docker.socket. Oct 2 19:18:18.234517 systemd[1]: Reached target sockets.target. Oct 2 19:18:18.243345 systemd[1]: Reached target basic.target. Oct 2 19:18:18.250432 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:18.250480 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:18.252076 systemd[1]: Starting containerd.service... Oct 2 19:18:18.260796 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:18:18.271206 systemd[1]: Starting dbus.service... Oct 2 19:18:18.278967 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:18:18.288143 systemd[1]: Starting extend-filesystems.service... Oct 2 19:18:18.295343 jq[1100]: false Oct 2 19:18:18.296352 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:18:18.298343 systemd[1]: Starting motdgen.service... Oct 2 19:18:18.307419 systemd[1]: Starting oem-gce.service... Oct 2 19:18:18.317184 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:18:18.328232 systemd[1]: Starting prepare-critools.service... Oct 2 19:18:18.338544 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:18:18.349357 systemd[1]: Starting sshd-keygen.service... Oct 2 19:18:18.361812 systemd[1]: Starting systemd-logind.service... Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda1 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda2 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda3 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found usr Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda4 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda6 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda7 Oct 2 19:18:18.365121 extend-filesystems[1101]: Found sda9 Oct 2 19:18:18.486319 extend-filesystems[1101]: Checking size of /dev/sda9 Oct 2 19:18:18.369335 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:18.494780 extend-filesystems[1101]: Resized partition /dev/sda9 Oct 2 19:18:18.369457 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Oct 2 19:18:18.370230 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:18:18.503480 jq[1125]: true Oct 2 19:18:18.371517 systemd[1]: Starting update-engine.service... Oct 2 19:18:18.380015 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:18:18.391575 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:18:18.391839 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:18:18.504842 tar[1128]: ./ Oct 2 19:18:18.504842 tar[1128]: ./loopback Oct 2 19:18:18.392439 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:18:18.392686 systemd[1]: Finished motdgen.service. Oct 2 19:18:18.505691 mkfs.ext4[1132]: mke2fs 1.46.5 (30-Dec-2021) Oct 2 19:18:18.505691 mkfs.ext4[1132]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Oct 2 19:18:18.505691 mkfs.ext4[1132]: Creating filesystem with 262144 4k blocks and 65536 inodes Oct 2 19:18:18.505691 mkfs.ext4[1132]: Filesystem UUID: 0e0969fc-7ed6-40ed-a33c-02684c4f6528 Oct 2 19:18:18.505691 mkfs.ext4[1132]: Superblock backups stored on blocks: Oct 2 19:18:18.505691 mkfs.ext4[1132]: 32768, 98304, 163840, 229376 Oct 2 19:18:18.505691 mkfs.ext4[1132]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:18:18.505691 mkfs.ext4[1132]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:18:18.505691 mkfs.ext4[1132]: Creating journal (8192 blocks): done Oct 2 19:18:18.505691 mkfs.ext4[1132]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Oct 2 19:18:18.404391 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:18:18.506393 jq[1130]: true Oct 2 19:18:18.404697 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:18:18.442322 systemd-networkd[1014]: eth0: Gained IPv6LL Oct 2 19:18:18.521304 extend-filesystems[1147]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:18:18.531723 umount[1146]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Oct 2 19:18:18.532136 dbus-daemon[1099]: [system] SELinux support is enabled Oct 2 19:18:18.532735 systemd[1]: Started dbus.service. Oct 2 19:18:18.550173 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Oct 2 19:18:18.550319 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:18:18.550360 tar[1129]: crictl Oct 2 19:18:18.557549 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:18:18.557593 systemd[1]: Reached target system-config.target. Oct 2 19:18:18.562313 dbus-daemon[1099]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1014 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:18:18.566355 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:18:18.566399 systemd[1]: Reached target user-config.target. Oct 2 19:18:18.575977 dbus-daemon[1099]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:18:18.582367 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:18:18.611699 update_engine[1121]: I1002 19:18:18.611572 1121 main.cc:92] Flatcar Update Engine starting Oct 2 19:18:18.618883 systemd[1]: Started update-engine.service. Oct 2 19:18:18.619579 update_engine[1121]: I1002 19:18:18.619436 1121 update_check_scheduler.cc:74] Next update check in 4m12s Oct 2 19:18:18.637194 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Oct 2 19:18:18.638465 systemd[1]: Started locksmithd.service. Oct 2 19:18:18.697213 extend-filesystems[1147]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 19:18:18.697213 extend-filesystems[1147]: old_desc_blocks = 1, new_desc_blocks = 2 Oct 2 19:18:18.697213 extend-filesystems[1147]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Oct 2 19:18:18.766027 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:18:18.699850 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:18:18.766310 bash[1164]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:18:18.766450 extend-filesystems[1101]: Resized filesystem in /dev/sda9 Oct 2 19:18:18.700092 systemd[1]: Finished extend-filesystems.service. Oct 2 19:18:18.710139 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:18:18.778701 systemd-logind[1119]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:18:18.793276 systemd-logind[1119]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:18:18.794315 systemd-logind[1119]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:18:18.794731 systemd-logind[1119]: New seat seat0. Oct 2 19:18:18.805041 systemd[1]: Started systemd-logind.service. Oct 2 19:18:18.814239 env[1131]: time="2023-10-02T19:18:18.806563453Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:18:18.933234 tar[1128]: ./bandwidth Oct 2 19:18:19.036977 coreos-metadata[1098]: Oct 02 19:18:19.036 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Oct 2 19:18:19.045698 coreos-metadata[1098]: Oct 02 19:18:19.045 INFO Fetch failed with 404: resource not found Oct 2 19:18:19.045968 coreos-metadata[1098]: Oct 02 19:18:19.045 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Oct 2 19:18:19.048525 coreos-metadata[1098]: Oct 02 19:18:19.048 INFO Fetch successful Oct 2 19:18:19.048777 coreos-metadata[1098]: Oct 02 19:18:19.048 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Oct 2 19:18:19.051106 coreos-metadata[1098]: Oct 02 19:18:19.050 INFO Fetch failed with 404: resource not found Oct 2 19:18:19.051377 coreos-metadata[1098]: Oct 02 19:18:19.051 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Oct 2 19:18:19.053733 coreos-metadata[1098]: Oct 02 19:18:19.053 INFO Fetch failed with 404: resource not found Oct 2 19:18:19.053961 coreos-metadata[1098]: Oct 02 19:18:19.053 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Oct 2 19:18:19.058462 coreos-metadata[1098]: Oct 02 19:18:19.058 INFO Fetch successful Oct 2 19:18:19.064736 unknown[1098]: wrote ssh authorized keys file for user: core Oct 2 19:18:19.119584 update-ssh-keys[1175]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:18:19.131297 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:18:19.136905 env[1131]: time="2023-10-02T19:18:19.136834040Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:18:19.137099 env[1131]: time="2023-10-02T19:18:19.137057448Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147305932Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147359050Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147704835Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147736526Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147759559Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147777861Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148183 env[1131]: time="2023-10-02T19:18:19.147909195Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148612 env[1131]: time="2023-10-02T19:18:19.148284909Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148612 env[1131]: time="2023-10-02T19:18:19.148530355Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:19.148612 env[1131]: time="2023-10-02T19:18:19.148558963Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:18:19.148755 env[1131]: time="2023-10-02T19:18:19.148648222Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:18:19.148755 env[1131]: time="2023-10-02T19:18:19.148669364Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:18:19.160059 env[1131]: time="2023-10-02T19:18:19.160006989Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:18:19.160228 env[1131]: time="2023-10-02T19:18:19.160065465Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:18:19.160228 env[1131]: time="2023-10-02T19:18:19.160102349Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:18:19.160353 env[1131]: time="2023-10-02T19:18:19.160219496Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160353 env[1131]: time="2023-10-02T19:18:19.160254454Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160353 env[1131]: time="2023-10-02T19:18:19.160279262Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160353 env[1131]: time="2023-10-02T19:18:19.160302501Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160353 env[1131]: time="2023-10-02T19:18:19.160333041Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160584 env[1131]: time="2023-10-02T19:18:19.160355926Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160584 env[1131]: time="2023-10-02T19:18:19.160378958Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160584 env[1131]: time="2023-10-02T19:18:19.160406053Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.160584 env[1131]: time="2023-10-02T19:18:19.160427345Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:18:19.160778 env[1131]: time="2023-10-02T19:18:19.160579310Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:18:19.160778 env[1131]: time="2023-10-02T19:18:19.160717464Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:18:19.161304 env[1131]: time="2023-10-02T19:18:19.161271537Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:18:19.161404 env[1131]: time="2023-10-02T19:18:19.161322161Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161404 env[1131]: time="2023-10-02T19:18:19.161345479Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:18:19.161515 env[1131]: time="2023-10-02T19:18:19.161427220Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161515 env[1131]: time="2023-10-02T19:18:19.161452056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161614 env[1131]: time="2023-10-02T19:18:19.161545955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161614 env[1131]: time="2023-10-02T19:18:19.161568963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161614 env[1131]: time="2023-10-02T19:18:19.161590977Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161760 env[1131]: time="2023-10-02T19:18:19.161612755Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161760 env[1131]: time="2023-10-02T19:18:19.161632226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161760 env[1131]: time="2023-10-02T19:18:19.161653815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161760 env[1131]: time="2023-10-02T19:18:19.161677253Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:18:19.161961 env[1131]: time="2023-10-02T19:18:19.161862991Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161961 env[1131]: time="2023-10-02T19:18:19.161889120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161961 env[1131]: time="2023-10-02T19:18:19.161910010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.161961 env[1131]: time="2023-10-02T19:18:19.161930929Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:18:19.162180 env[1131]: time="2023-10-02T19:18:19.161956848Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:18:19.162180 env[1131]: time="2023-10-02T19:18:19.161976183Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:18:19.162180 env[1131]: time="2023-10-02T19:18:19.162005175Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:18:19.162180 env[1131]: time="2023-10-02T19:18:19.162054041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:18:19.162497 env[1131]: time="2023-10-02T19:18:19.162408042Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.162507735Z" level=info msg="Connect containerd service" Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.162559827Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.163452167Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.163832950Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.163896779Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:18:19.167008 env[1131]: time="2023-10-02T19:18:19.164215649Z" level=info msg="containerd successfully booted in 0.378692s" Oct 2 19:18:19.164069 systemd[1]: Started containerd.service. Oct 2 19:18:19.175006 dbus-daemon[1099]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:18:19.175230 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:18:19.175915 dbus-daemon[1099]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1160 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:18:19.177547 env[1131]: time="2023-10-02T19:18:19.177461393Z" level=info msg="Start subscribing containerd event" Oct 2 19:18:19.177669 env[1131]: time="2023-10-02T19:18:19.177585884Z" level=info msg="Start recovering state" Oct 2 19:18:19.177727 env[1131]: time="2023-10-02T19:18:19.177701006Z" level=info msg="Start event monitor" Oct 2 19:18:19.177782 env[1131]: time="2023-10-02T19:18:19.177729203Z" level=info msg="Start snapshots syncer" Oct 2 19:18:19.177782 env[1131]: time="2023-10-02T19:18:19.177747887Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:18:19.177782 env[1131]: time="2023-10-02T19:18:19.177767957Z" level=info msg="Start streaming server" Oct 2 19:18:19.188962 systemd[1]: Starting polkit.service... Oct 2 19:18:19.220170 tar[1128]: ./ptp Oct 2 19:18:19.292799 polkitd[1177]: Started polkitd version 121 Oct 2 19:18:19.318871 polkitd[1177]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:18:19.319201 polkitd[1177]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:18:19.321838 polkitd[1177]: Finished loading, compiling and executing 2 rules Oct 2 19:18:19.322611 dbus-daemon[1099]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:18:19.322850 systemd[1]: Started polkit.service. Oct 2 19:18:19.323660 polkitd[1177]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:18:19.345880 tar[1128]: ./vlan Oct 2 19:18:19.353881 systemd-hostnamed[1160]: Hostname set to (transient) Oct 2 19:18:19.357259 systemd-resolved[1064]: System hostname changed to 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal'. Oct 2 19:18:19.466208 tar[1128]: ./host-device Oct 2 19:18:19.573174 tar[1128]: ./tuning Oct 2 19:18:19.667178 tar[1128]: ./vrf Oct 2 19:18:19.759321 tar[1128]: ./sbr Oct 2 19:18:19.865480 tar[1128]: ./tap Oct 2 19:18:19.977392 tar[1128]: ./dhcp Oct 2 19:18:20.258001 tar[1128]: ./static Oct 2 19:18:20.333763 tar[1128]: ./firewall Oct 2 19:18:20.377734 systemd[1]: Finished prepare-critools.service. Oct 2 19:18:20.422433 tar[1128]: ./macvlan Oct 2 19:18:20.476332 tar[1128]: ./dummy Oct 2 19:18:20.568327 tar[1128]: ./bridge Oct 2 19:18:20.678845 tar[1128]: ./ipvlan Oct 2 19:18:20.781673 tar[1128]: ./portmap Oct 2 19:18:20.855422 tar[1128]: ./host-local Oct 2 19:18:20.958065 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:18:21.618793 sshd_keygen[1135]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:18:21.660246 systemd[1]: Finished sshd-keygen.service. Oct 2 19:18:21.669837 systemd[1]: Starting issuegen.service... Oct 2 19:18:21.680372 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:18:21.680563 systemd[1]: Finished issuegen.service. Oct 2 19:18:21.688298 locksmithd[1165]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:18:21.689870 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:18:21.701522 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:18:21.712579 systemd[1]: Started getty@tty1.service. Oct 2 19:18:21.721372 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:18:21.730745 systemd[1]: Reached target getty.target. Oct 2 19:18:24.064338 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Oct 2 19:18:26.132192 kernel: loop0: detected capacity change from 0 to 2097152 Oct 2 19:18:26.161392 systemd-nspawn[1207]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Oct 2 19:18:26.161392 systemd-nspawn[1207]: Press ^] three times within 1s to kill container. Oct 2 19:18:26.176194 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:18:26.267809 systemd[1]: Started oem-gce.service. Oct 2 19:18:26.275821 systemd[1]: Reached target multi-user.target. Oct 2 19:18:26.286390 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:18:26.299500 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:18:26.299735 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:18:26.309529 systemd[1]: Startup finished in 1.032s (kernel) + 9.341s (initrd) + 15.743s (userspace) = 26.117s. Oct 2 19:18:26.378984 systemd-nspawn[1207]: + '[' -e /etc/default/instance_configs.cfg.template ']' Oct 2 19:18:26.379220 systemd-nspawn[1207]: + echo -e '[InstanceSetup]\nset_host_keys = false' Oct 2 19:18:26.379343 systemd-nspawn[1207]: + /usr/bin/google_instance_setup Oct 2 19:18:27.030871 instance-setup[1213]: INFO Running google_set_multiqueue. Oct 2 19:18:27.046841 instance-setup[1213]: INFO Set channels for eth0 to 2. Oct 2 19:18:27.050131 instance-setup[1213]: INFO Setting /proc/irq/27/smp_affinity_list to 0 for device virtio1. Oct 2 19:18:27.051518 instance-setup[1213]: INFO /proc/irq/27/smp_affinity_list: real affinity 0 Oct 2 19:18:27.051986 instance-setup[1213]: INFO Setting /proc/irq/28/smp_affinity_list to 0 for device virtio1. Oct 2 19:18:27.053497 instance-setup[1213]: INFO /proc/irq/28/smp_affinity_list: real affinity 0 Oct 2 19:18:27.053842 instance-setup[1213]: INFO Setting /proc/irq/29/smp_affinity_list to 1 for device virtio1. Oct 2 19:18:27.055264 instance-setup[1213]: INFO /proc/irq/29/smp_affinity_list: real affinity 1 Oct 2 19:18:27.055842 instance-setup[1213]: INFO Setting /proc/irq/30/smp_affinity_list to 1 for device virtio1. Oct 2 19:18:27.057338 instance-setup[1213]: INFO /proc/irq/30/smp_affinity_list: real affinity 1 Oct 2 19:18:27.069475 instance-setup[1213]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Oct 2 19:18:27.069845 instance-setup[1213]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Oct 2 19:18:27.112306 systemd-nspawn[1207]: + /usr/bin/google_metadata_script_runner --script-type startup Oct 2 19:18:27.446847 startup-script[1244]: INFO Starting startup scripts. Oct 2 19:18:27.460108 startup-script[1244]: INFO No startup scripts found in metadata. Oct 2 19:18:27.460304 startup-script[1244]: INFO Finished running startup scripts. Oct 2 19:18:27.494025 systemd-nspawn[1207]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Oct 2 19:18:27.494025 systemd-nspawn[1207]: + daemon_pids=() Oct 2 19:18:27.494633 systemd-nspawn[1207]: + for d in accounts clock_skew network Oct 2 19:18:27.494633 systemd-nspawn[1207]: + daemon_pids+=($!) Oct 2 19:18:27.494633 systemd-nspawn[1207]: + for d in accounts clock_skew network Oct 2 19:18:27.494928 systemd-nspawn[1207]: + daemon_pids+=($!) Oct 2 19:18:27.495083 systemd-nspawn[1207]: + for d in accounts clock_skew network Oct 2 19:18:27.495315 systemd-nspawn[1207]: + /usr/bin/google_accounts_daemon Oct 2 19:18:27.495486 systemd-nspawn[1207]: + daemon_pids+=($!) Oct 2 19:18:27.495638 systemd-nspawn[1207]: + NOTIFY_SOCKET=/run/systemd/notify Oct 2 19:18:27.495719 systemd-nspawn[1207]: + /usr/bin/systemd-notify --ready Oct 2 19:18:27.496207 systemd-nspawn[1207]: + /usr/bin/google_network_daemon Oct 2 19:18:27.496562 systemd-nspawn[1207]: + /usr/bin/google_clock_skew_daemon Oct 2 19:18:27.544131 systemd-nspawn[1207]: + wait -n 36 37 38 Oct 2 19:18:27.983228 systemd[1]: Created slice system-sshd.slice. Oct 2 19:18:27.985717 systemd[1]: Started sshd@0-10.128.0.6:22-147.75.109.163:49398.service. Oct 2 19:18:28.096773 google-clock-skew[1248]: INFO Starting Google Clock Skew daemon. Oct 2 19:18:28.120997 google-clock-skew[1248]: INFO Clock drift token has changed: 0. Oct 2 19:18:28.133499 systemd-nspawn[1207]: hwclock: Cannot access the Hardware Clock via any known method. Oct 2 19:18:28.133806 systemd-nspawn[1207]: hwclock: Use the --verbose option to see the details of our search for an access method. Oct 2 19:18:28.134899 google-clock-skew[1248]: WARNING Failed to sync system time with hardware clock. Oct 2 19:18:28.224988 groupadd[1261]: group added to /etc/group: name=google-sudoers, GID=1000 Oct 2 19:18:28.236642 groupadd[1261]: group added to /etc/gshadow: name=google-sudoers Oct 2 19:18:28.245804 groupadd[1261]: new group: name=google-sudoers, GID=1000 Oct 2 19:18:28.277141 google-accounts[1247]: INFO Starting Google Accounts daemon. Oct 2 19:18:28.294074 google-networking[1249]: INFO Starting Google Networking daemon. Oct 2 19:18:28.309558 google-accounts[1247]: WARNING OS Login not installed. Oct 2 19:18:28.310488 google-accounts[1247]: INFO Creating a new user account for 0. Oct 2 19:18:28.316727 systemd-nspawn[1207]: useradd: invalid user name '0': use --badname to ignore Oct 2 19:18:28.317503 google-accounts[1247]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Oct 2 19:18:28.330075 sshd[1256]: Accepted publickey for core from 147.75.109.163 port 49398 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:28.333639 sshd[1256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:28.350654 systemd[1]: Created slice user-500.slice. Oct 2 19:18:28.352625 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:18:28.357526 systemd-logind[1119]: New session 1 of user core. Oct 2 19:18:28.368430 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:18:28.370913 systemd[1]: Starting user@500.service... Oct 2 19:18:28.383640 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:28.488289 systemd[1273]: Queued start job for default target default.target. Oct 2 19:18:28.489193 systemd[1273]: Reached target paths.target. Oct 2 19:18:28.489232 systemd[1273]: Reached target sockets.target. Oct 2 19:18:28.489253 systemd[1273]: Reached target timers.target. Oct 2 19:18:28.489273 systemd[1273]: Reached target basic.target. Oct 2 19:18:28.489350 systemd[1273]: Reached target default.target. Oct 2 19:18:28.489402 systemd[1273]: Startup finished in 97ms. Oct 2 19:18:28.489455 systemd[1]: Started user@500.service. Oct 2 19:18:28.491217 systemd[1]: Started session-1.scope. Oct 2 19:18:28.712770 systemd[1]: Started sshd@1-10.128.0.6:22-147.75.109.163:49404.service. Oct 2 19:18:29.005562 sshd[1282]: Accepted publickey for core from 147.75.109.163 port 49404 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:29.007506 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:29.014116 systemd-logind[1119]: New session 2 of user core. Oct 2 19:18:29.014851 systemd[1]: Started session-2.scope. Oct 2 19:18:29.227093 sshd[1282]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:29.231204 systemd[1]: sshd@1-10.128.0.6:22-147.75.109.163:49404.service: Deactivated successfully. Oct 2 19:18:29.232295 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:18:29.233092 systemd-logind[1119]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:18:29.234374 systemd-logind[1119]: Removed session 2. Oct 2 19:18:29.272401 systemd[1]: Started sshd@2-10.128.0.6:22-147.75.109.163:49420.service. Oct 2 19:18:29.561982 sshd[1288]: Accepted publickey for core from 147.75.109.163 port 49420 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:29.563849 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:29.571017 systemd[1]: Started session-3.scope. Oct 2 19:18:29.571847 systemd-logind[1119]: New session 3 of user core. Oct 2 19:18:29.771259 sshd[1288]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:29.775536 systemd[1]: sshd@2-10.128.0.6:22-147.75.109.163:49420.service: Deactivated successfully. Oct 2 19:18:29.776651 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:18:29.777582 systemd-logind[1119]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:18:29.779072 systemd-logind[1119]: Removed session 3. Oct 2 19:18:29.816606 systemd[1]: Started sshd@3-10.128.0.6:22-147.75.109.163:49436.service. Oct 2 19:18:30.105481 sshd[1294]: Accepted publickey for core from 147.75.109.163 port 49436 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:30.107387 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:30.113228 systemd-logind[1119]: New session 4 of user core. Oct 2 19:18:30.114071 systemd[1]: Started session-4.scope. Oct 2 19:18:30.318552 sshd[1294]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:30.322734 systemd[1]: sshd@3-10.128.0.6:22-147.75.109.163:49436.service: Deactivated successfully. Oct 2 19:18:30.323788 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:18:30.324739 systemd-logind[1119]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:18:30.325957 systemd-logind[1119]: Removed session 4. Oct 2 19:18:30.363896 systemd[1]: Started sshd@4-10.128.0.6:22-147.75.109.163:49442.service. Oct 2 19:18:30.651935 sshd[1300]: Accepted publickey for core from 147.75.109.163 port 49442 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:30.653599 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:30.660324 systemd[1]: Started session-5.scope. Oct 2 19:18:30.661120 systemd-logind[1119]: New session 5 of user core. Oct 2 19:18:30.852520 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:18:30.852926 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:30.862435 dbus-daemon[1099]: \xd0\u001d\u0006n\x9eU: received setenforce notice (enforcing=-1977019568) Oct 2 19:18:30.864634 sudo[1303]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:30.908724 sshd[1300]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:30.914004 systemd-logind[1119]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:18:30.914507 systemd[1]: sshd@4-10.128.0.6:22-147.75.109.163:49442.service: Deactivated successfully. Oct 2 19:18:30.915655 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:18:30.916855 systemd-logind[1119]: Removed session 5. Oct 2 19:18:30.955024 systemd[1]: Started sshd@5-10.128.0.6:22-147.75.109.163:49458.service. Oct 2 19:18:31.247222 sshd[1307]: Accepted publickey for core from 147.75.109.163 port 49458 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:31.248746 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:31.255296 systemd[1]: Started session-6.scope. Oct 2 19:18:31.256278 systemd-logind[1119]: New session 6 of user core. Oct 2 19:18:31.425874 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:18:31.426283 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:31.430508 sudo[1311]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:31.442557 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:18:31.442936 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:31.455302 systemd[1]: Stopping audit-rules.service... Oct 2 19:18:31.457000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:18:31.462733 kernel: kauditd_printk_skb: 130 callbacks suppressed Oct 2 19:18:31.462842 kernel: audit: type=1305 audit(1696274311.457:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:18:31.462886 auditctl[1314]: No rules Oct 2 19:18:31.463807 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:18:31.457000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed5a12200 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:31.464051 systemd[1]: Stopped audit-rules.service. Oct 2 19:18:31.480053 systemd[1]: Starting audit-rules.service... Oct 2 19:18:31.457000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:18:31.519051 kernel: audit: type=1300 audit(1696274311.457:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed5a12200 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:31.519201 kernel: audit: type=1327 audit(1696274311.457:165): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:18:31.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.543204 kernel: audit: type=1131 audit(1696274311.462:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.545704 augenrules[1331]: No rules Oct 2 19:18:31.546693 systemd[1]: Finished audit-rules.service. Oct 2 19:18:31.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.548277 sudo[1310]: pam_unix(sudo:session): session closed for user root Oct 2 19:18:31.546000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.594015 kernel: audit: type=1130 audit(1696274311.546:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.594206 kernel: audit: type=1106 audit(1696274311.546:168): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.594257 kernel: audit: type=1104 audit(1696274311.546:169): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.546000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.618537 sshd[1307]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:31.621000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.624005 systemd[1]: sshd@5-10.128.0.6:22-147.75.109.163:49458.service: Deactivated successfully. Oct 2 19:18:31.625088 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:18:31.627365 systemd-logind[1119]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:18:31.628913 systemd-logind[1119]: Removed session 6. Oct 2 19:18:31.647311 systemd[1]: Started sshd@6-10.128.0.6:22-147.75.109.163:49472.service. Oct 2 19:18:31.654178 kernel: audit: type=1106 audit(1696274311.621:170): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.621000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.679275 kernel: audit: type=1104 audit(1696274311.621:171): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.679335 kernel: audit: type=1131 audit(1696274311.621:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.6:22-147.75.109.163:49458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.6:22-147.75.109.163:49458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-147.75.109.163:49472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:31.939000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.941543 sshd[1337]: Accepted publickey for core from 147.75.109.163 port 49472 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:18:31.941000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.941000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6c64fd50 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:31.941000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:31.942565 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:31.949250 systemd-logind[1119]: New session 7 of user core. Oct 2 19:18:31.949482 systemd[1]: Started session-7.scope. Oct 2 19:18:31.958000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:31.960000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:18:32.116000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:32.117230 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:18:32.117000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:32.117618 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:18:32.119000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:18:32.735309 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:18:32.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:32.744889 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:18:32.745499 systemd[1]: Reached target network-online.target. Oct 2 19:18:32.747866 systemd[1]: Starting docker.service... Oct 2 19:18:32.797377 env[1356]: time="2023-10-02T19:18:32.797297736Z" level=info msg="Starting up" Oct 2 19:18:32.798959 env[1356]: time="2023-10-02T19:18:32.798895524Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:18:32.798959 env[1356]: time="2023-10-02T19:18:32.798926334Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:18:32.798959 env[1356]: time="2023-10-02T19:18:32.798956911Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:18:32.798959 env[1356]: time="2023-10-02T19:18:32.798973031Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:18:32.801242 env[1356]: time="2023-10-02T19:18:32.801210541Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:18:32.801379 env[1356]: time="2023-10-02T19:18:32.801356954Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:18:32.801470 env[1356]: time="2023-10-02T19:18:32.801453431Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:18:32.801544 env[1356]: time="2023-10-02T19:18:32.801531214Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:18:32.812011 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1480411019-merged.mount: Deactivated successfully. Oct 2 19:18:32.856369 env[1356]: time="2023-10-02T19:18:32.856315645Z" level=info msg="Loading containers: start." Oct 2 19:18:32.930000 audit[1386]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.930000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe20619ec0 a2=0 a3=7ffe20619eac items=0 ppid=1356 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:18:32.933000 audit[1388]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.933000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc1223d5b0 a2=0 a3=7ffc1223d59c items=0 ppid=1356 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.933000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:18:32.937000 audit[1390]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.937000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdc1f934b0 a2=0 a3=7ffdc1f9349c items=0 ppid=1356 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:18:32.940000 audit[1392]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.940000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdaa8e0e80 a2=0 a3=7ffdaa8e0e6c items=0 ppid=1356 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:18:32.944000 audit[1394]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.944000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe54fe25a0 a2=0 a3=7ffe54fe258c items=0 ppid=1356 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:18:32.964000 audit[1399]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.964000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff64200e20 a2=0 a3=7fff64200e0c items=0 ppid=1356 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:18:32.977000 audit[1401]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.977000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffc80cd260 a2=0 a3=7fffc80cd24c items=0 ppid=1356 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:18:32.980000 audit[1403]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.980000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff3cbca110 a2=0 a3=7fff3cbca0fc items=0 ppid=1356 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:18:32.983000 audit[1405]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.983000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdb56650d0 a2=0 a3=7ffdb56650bc items=0 ppid=1356 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.983000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:18:32.998000 audit[1409]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:32.998000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc2088e100 a2=0 a3=7ffc2088e0ec items=0 ppid=1356 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:32.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:18:33.001000 audit[1410]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.001000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff724fa030 a2=0 a3=7fff724fa01c items=0 ppid=1356 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:18:33.016363 kernel: Initializing XFRM netlink socket Oct 2 19:18:33.064894 env[1356]: time="2023-10-02T19:18:33.064834071Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:18:33.098000 audit[1418]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.098000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe3c2b6f00 a2=0 a3=7ffe3c2b6eec items=0 ppid=1356 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:18:33.112000 audit[1421]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.112000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc113c05a0 a2=0 a3=7ffc113c058c items=0 ppid=1356 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:18:33.117000 audit[1424]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.117000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd61104420 a2=0 a3=7ffd6110440c items=0 ppid=1356 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.117000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:18:33.120000 audit[1426]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.120000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb8e6fa80 a2=0 a3=7ffeb8e6fa6c items=0 ppid=1356 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:18:33.123000 audit[1428]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.123000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdc057bd80 a2=0 a3=7ffdc057bd6c items=0 ppid=1356 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:18:33.126000 audit[1430]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.126000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc54db9320 a2=0 a3=7ffc54db930c items=0 ppid=1356 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:18:33.129000 audit[1432]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.129000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffb615e0b0 a2=0 a3=7fffb615e09c items=0 ppid=1356 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:18:33.142000 audit[1435]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.142000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd8db160d0 a2=0 a3=7ffd8db160bc items=0 ppid=1356 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:18:33.146000 audit[1437]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.146000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa9bb0910 a2=0 a3=7fffa9bb08fc items=0 ppid=1356 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:18:33.150000 audit[1439]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.150000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe2768f1b0 a2=0 a3=7ffe2768f19c items=0 ppid=1356 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:18:33.154000 audit[1441]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.154000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9c787060 a2=0 a3=7ffc9c78704c items=0 ppid=1356 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:18:33.154829 systemd-networkd[1014]: docker0: Link UP Oct 2 19:18:33.170000 audit[1445]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.170000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1e87f040 a2=0 a3=7ffe1e87f02c items=0 ppid=1356 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:18:33.171000 audit[1446]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:33.171000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe25891fc0 a2=0 a3=7ffe25891fac items=0 ppid=1356 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:33.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:18:33.172668 env[1356]: time="2023-10-02T19:18:33.172625172Z" level=info msg="Loading containers: done." Oct 2 19:18:33.195781 env[1356]: time="2023-10-02T19:18:33.195707883Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:18:33.196049 env[1356]: time="2023-10-02T19:18:33.196024419Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:18:33.196228 env[1356]: time="2023-10-02T19:18:33.196187881Z" level=info msg="Daemon has completed initialization" Oct 2 19:18:33.219485 systemd[1]: Started docker.service. Oct 2 19:18:33.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:33.233735 env[1356]: time="2023-10-02T19:18:33.233631384Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:18:33.259646 systemd[1]: Reloading. Oct 2 19:18:33.367076 /usr/lib/systemd/system-generators/torcx-generator[1495]: time="2023-10-02T19:18:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:33.370263 /usr/lib/systemd/system-generators/torcx-generator[1495]: time="2023-10-02T19:18:33Z" level=info msg="torcx already run" Oct 2 19:18:33.469500 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:33.469533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:33.493302 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.583000 audit: BPF prog-id=37 op=LOAD Oct 2 19:18:33.583000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.586000 audit: BPF prog-id=38 op=LOAD Oct 2 19:18:33.586000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.588000 audit: BPF prog-id=39 op=LOAD Oct 2 19:18:33.588000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.607000 audit: BPF prog-id=40 op=LOAD Oct 2 19:18:33.607000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit: BPF prog-id=41 op=LOAD Oct 2 19:18:33.609000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit: BPF prog-id=42 op=LOAD Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.609000 audit: BPF prog-id=43 op=LOAD Oct 2 19:18:33.609000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:18:33.609000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit: BPF prog-id=44 op=LOAD Oct 2 19:18:33.611000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit: BPF prog-id=45 op=LOAD Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.612000 audit: BPF prog-id=46 op=LOAD Oct 2 19:18:33.612000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:18:33.612000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit: BPF prog-id=47 op=LOAD Oct 2 19:18:33.616000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit: BPF prog-id=48 op=LOAD Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.616000 audit: BPF prog-id=49 op=LOAD Oct 2 19:18:33.616000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:18:33.616000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit: BPF prog-id=50 op=LOAD Oct 2 19:18:33.617000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit: BPF prog-id=51 op=LOAD Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.617000 audit: BPF prog-id=52 op=LOAD Oct 2 19:18:33.617000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:18:33.617000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit: BPF prog-id=53 op=LOAD Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:33.618000 audit: BPF prog-id=54 op=LOAD Oct 2 19:18:33.618000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:18:33.618000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:18:33.635677 systemd[1]: Started kubelet.service. Oct 2 19:18:33.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:33.735655 kubelet[1538]: E1002 19:18:33.735578 1538 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:18:33.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:18:33.737893 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:18:33.738040 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:18:34.184838 env[1131]: time="2023-10-02T19:18:34.184772141Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:18:34.727488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1105808808.mount: Deactivated successfully. Oct 2 19:18:36.841925 env[1131]: time="2023-10-02T19:18:36.841848328Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:36.846092 env[1131]: time="2023-10-02T19:18:36.846023364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:36.849062 env[1131]: time="2023-10-02T19:18:36.849009183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:36.852205 env[1131]: time="2023-10-02T19:18:36.852133100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:36.853299 env[1131]: time="2023-10-02T19:18:36.853226406Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:18:36.867893 env[1131]: time="2023-10-02T19:18:36.867841821Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:18:38.807436 env[1131]: time="2023-10-02T19:18:38.807363878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:38.810376 env[1131]: time="2023-10-02T19:18:38.810319256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:38.813020 env[1131]: time="2023-10-02T19:18:38.812972892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:38.819433 env[1131]: time="2023-10-02T19:18:38.819375000Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:38.820667 env[1131]: time="2023-10-02T19:18:38.820597746Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:18:38.836456 env[1131]: time="2023-10-02T19:18:38.836388604Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:18:40.073212 env[1131]: time="2023-10-02T19:18:40.073097037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:40.080163 env[1131]: time="2023-10-02T19:18:40.080094943Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:40.082799 env[1131]: time="2023-10-02T19:18:40.082755737Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:40.085688 env[1131]: time="2023-10-02T19:18:40.085644025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:40.086914 env[1131]: time="2023-10-02T19:18:40.086869193Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:18:40.102368 env[1131]: time="2023-10-02T19:18:40.102301226Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:18:41.138175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3210144495.mount: Deactivated successfully. Oct 2 19:18:41.815238 env[1131]: time="2023-10-02T19:18:41.815146136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:41.818419 env[1131]: time="2023-10-02T19:18:41.818371159Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:41.820710 env[1131]: time="2023-10-02T19:18:41.820648379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:41.823254 env[1131]: time="2023-10-02T19:18:41.823204962Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:41.824020 env[1131]: time="2023-10-02T19:18:41.823963675Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:18:41.838781 env[1131]: time="2023-10-02T19:18:41.838729688Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:18:42.205901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2636340690.mount: Deactivated successfully. Oct 2 19:18:42.217885 env[1131]: time="2023-10-02T19:18:42.217815545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:42.220877 env[1131]: time="2023-10-02T19:18:42.220821097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:42.223261 env[1131]: time="2023-10-02T19:18:42.223213237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:42.225672 env[1131]: time="2023-10-02T19:18:42.225625394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:42.226465 env[1131]: time="2023-10-02T19:18:42.226409357Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:18:42.240869 env[1131]: time="2023-10-02T19:18:42.240806176Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:18:43.989330 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:18:43.989667 systemd[1]: Stopped kubelet.service. Oct 2 19:18:43.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:43.997310 kernel: kauditd_printk_skb: 293 callbacks suppressed Oct 2 19:18:43.997445 kernel: audit: type=1130 audit(1696274323.989:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.020000 systemd[1]: Started kubelet.service. Oct 2 19:18:43.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.051361 kernel: audit: type=1131 audit(1696274323.989:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.075183 kernel: audit: type=1130 audit(1696274324.020:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:44.171763 kubelet[1583]: E1002 19:18:44.171705 1583 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:18:44.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:18:44.177319 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:18:44.177532 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:18:44.200210 kernel: audit: type=1131 audit(1696274324.177:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:18:47.236141 env[1131]: time="2023-10-02T19:18:47.236065310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:47.239528 env[1131]: time="2023-10-02T19:18:47.239451433Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:47.242120 env[1131]: time="2023-10-02T19:18:47.242072747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:47.244913 env[1131]: time="2023-10-02T19:18:47.244846020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:47.246100 env[1131]: time="2023-10-02T19:18:47.246045519Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:18:47.260618 env[1131]: time="2023-10-02T19:18:47.260566277Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:18:47.642510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3900539513.mount: Deactivated successfully. Oct 2 19:18:48.395021 env[1131]: time="2023-10-02T19:18:48.394942310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.398622 env[1131]: time="2023-10-02T19:18:48.398559477Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.401246 env[1131]: time="2023-10-02T19:18:48.401199853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.404027 env[1131]: time="2023-10-02T19:18:48.403976502Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:48.404886 env[1131]: time="2023-10-02T19:18:48.404835225Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:18:49.410452 kernel: audit: type=1131 audit(1696274329.386:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:49.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:49.386227 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:18:49.426000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:18:49.440922 kernel: audit: type=1334 audit(1696274329.426:421): prog-id=52 op=UNLOAD Oct 2 19:18:49.441040 kernel: audit: type=1334 audit(1696274329.426:422): prog-id=51 op=UNLOAD Oct 2 19:18:49.426000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:18:49.426000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:18:49.449195 kernel: audit: type=1334 audit(1696274329.426:423): prog-id=50 op=UNLOAD Oct 2 19:18:51.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:51.538085 systemd[1]: Stopped kubelet.service. Oct 2 19:18:51.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:51.571416 systemd[1]: Reloading. Oct 2 19:18:51.581276 kernel: audit: type=1130 audit(1696274331.537:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:51.581421 kernel: audit: type=1131 audit(1696274331.539:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:51.679031 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2023-10-02T19:18:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:51.679081 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2023-10-02T19:18:51Z" level=info msg="torcx already run" Oct 2 19:18:51.774095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:51.774125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:51.797724 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.926915 kernel: audit: type=1400 audit(1696274331.884:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.927080 kernel: audit: type=1400 audit(1696274331.884:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.927137 kernel: audit: type=1400 audit(1696274331.889:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968218 kernel: audit: type=1400 audit(1696274331.889:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit: BPF prog-id=55 op=LOAD Oct 2 19:18:51.905000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.946000 audit: BPF prog-id=56 op=LOAD Oct 2 19:18:51.946000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.968000 audit: BPF prog-id=57 op=LOAD Oct 2 19:18:51.968000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.971000 audit: BPF prog-id=58 op=LOAD Oct 2 19:18:51.971000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit: BPF prog-id=59 op=LOAD Oct 2 19:18:51.973000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit: BPF prog-id=60 op=LOAD Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.973000 audit: BPF prog-id=61 op=LOAD Oct 2 19:18:51.973000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:18:51.973000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit: BPF prog-id=62 op=LOAD Oct 2 19:18:51.975000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit: BPF prog-id=63 op=LOAD Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.975000 audit: BPF prog-id=64 op=LOAD Oct 2 19:18:51.975000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:18:51.975000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit: BPF prog-id=65 op=LOAD Oct 2 19:18:51.979000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit: BPF prog-id=66 op=LOAD Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit: BPF prog-id=67 op=LOAD Oct 2 19:18:51.980000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:18:51.980000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit: BPF prog-id=68 op=LOAD Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.981000 audit: BPF prog-id=69 op=LOAD Oct 2 19:18:51.981000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:18:51.981000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:18:52.004553 systemd[1]: Started kubelet.service. Oct 2 19:18:52.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:52.069025 kubelet[1723]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:18:52.069861 kubelet[1723]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:18:52.070013 kubelet[1723]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:18:52.070365 kubelet[1723]: I1002 19:18:52.070277 1723 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:18:52.989995 kubelet[1723]: I1002 19:18:52.989934 1723 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:18:52.989995 kubelet[1723]: I1002 19:18:52.989977 1723 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:18:52.990420 kubelet[1723]: I1002 19:18:52.990380 1723 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:18:52.996099 kubelet[1723]: E1002 19:18:52.996070 1723 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.6:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:52.996396 kubelet[1723]: I1002 19:18:52.996372 1723 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:18:53.004811 kubelet[1723]: I1002 19:18:53.004741 1723 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:18:53.005291 kubelet[1723]: I1002 19:18:53.005242 1723 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:18:53.005545 kubelet[1723]: I1002 19:18:53.005506 1723 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:18:53.005545 kubelet[1723]: I1002 19:18:53.005542 1723 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:18:53.005797 kubelet[1723]: I1002 19:18:53.005558 1723 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:18:53.005797 kubelet[1723]: I1002 19:18:53.005697 1723 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:18:53.005925 kubelet[1723]: I1002 19:18:53.005827 1723 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:18:53.005925 kubelet[1723]: I1002 19:18:53.005850 1723 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:18:53.005925 kubelet[1723]: I1002 19:18:53.005886 1723 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:18:53.005925 kubelet[1723]: I1002 19:18:53.005914 1723 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:18:53.007016 kubelet[1723]: W1002 19:18:53.006956 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.007137 kubelet[1723]: E1002 19:18:53.007034 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.007137 kubelet[1723]: I1002 19:18:53.007134 1723 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:18:53.010436 kubelet[1723]: W1002 19:18:53.010374 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.010564 kubelet[1723]: E1002 19:18:53.010447 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.017501 kubelet[1723]: W1002 19:18:53.017467 1723 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:18:53.018424 kubelet[1723]: I1002 19:18:53.018397 1723 server.go:1232] "Started kubelet" Oct 2 19:18:53.019460 kubelet[1723]: E1002 19:18:53.019312 1723 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal.178a6084c52c1477", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", UID:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 18, 53, 18362999, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 18, 53, 18362999, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal"}': 'Post "https://10.128.0.6:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.6:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:18:53.020716 kubelet[1723]: E1002 19:18:53.020663 1723 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:18:53.020818 kubelet[1723]: E1002 19:18:53.020729 1723 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:18:53.021303 kubelet[1723]: I1002 19:18:53.021033 1723 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:18:53.021586 kubelet[1723]: I1002 19:18:53.021562 1723 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:18:53.021684 kubelet[1723]: I1002 19:18:53.021635 1723 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:18:53.021000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:53.021000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:53.021000 audit[1723]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005db710 a1=c000c75230 a2=c0005db5f0 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.022885 kubelet[1723]: I1002 19:18:53.022635 1723 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:18:53.021000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:53.023118 kubelet[1723]: I1002 19:18:53.023099 1723 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:18:53.022000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:53.022000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:53.022000 audit[1723]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dca7c0 a1=c000c75248 a2=c0005db7a0 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.022000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:53.023671 kubelet[1723]: I1002 19:18:53.023650 1723 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:18:53.023853 kubelet[1723]: I1002 19:18:53.023839 1723 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:18:53.028120 kubelet[1723]: I1002 19:18:53.027595 1723 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:18:53.028285 kubelet[1723]: I1002 19:18:53.028124 1723 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:18:53.028285 kubelet[1723]: I1002 19:18:53.028256 1723 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:18:53.028801 kubelet[1723]: W1002 19:18:53.028734 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.028909 kubelet[1723]: E1002 19:18:53.028815 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.029000 audit[1734]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.029000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4bc83310 a2=0 a3=7ffc4bc832fc items=0 ppid=1723 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.030652 kubelet[1723]: E1002 19:18:53.030641 1723 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="200ms" Oct 2 19:18:53.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:18:53.031000 audit[1735]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.031000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1ec220c0 a2=0 a3=7fff1ec220ac items=0 ppid=1723 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:18:53.035000 audit[1737]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.035000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6e85eb40 a2=0 a3=7ffe6e85eb2c items=0 ppid=1723 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:53.039000 audit[1739]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.039000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc489f4340 a2=0 a3=7ffc489f432c items=0 ppid=1723 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:18:53.059000 audit[1745]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.059000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeb99ffe70 a2=0 a3=7ffeb99ffe5c items=0 ppid=1723 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:18:53.061857 kubelet[1723]: I1002 19:18:53.061803 1723 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:18:53.062000 audit[1746]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:53.062000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc3270980 a2=0 a3=7fffc327096c items=0 ppid=1723 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:18:53.063957 kubelet[1723]: I1002 19:18:53.063935 1723 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:18:53.064104 kubelet[1723]: I1002 19:18:53.064088 1723 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:18:53.064251 kubelet[1723]: I1002 19:18:53.064235 1723 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:18:53.064423 kubelet[1723]: E1002 19:18:53.064408 1723 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:18:53.065374 kubelet[1723]: W1002 19:18:53.065337 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.065499 kubelet[1723]: E1002 19:18:53.065383 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:53.064000 audit[1747]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.064000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe8adb460 a2=0 a3=7fffe8adb44c items=0 ppid=1723 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:18:53.066000 audit[1748]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:53.066000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde49f1350 a2=0 a3=7ffde49f133c items=0 ppid=1723 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:18:53.069145 kubelet[1723]: I1002 19:18:53.069118 1723 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:18:53.068000 audit[1750]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.068000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5d2f62a0 a2=0 a3=7ffe5d2f628c items=0 ppid=1723 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:18:53.069964 kubelet[1723]: I1002 19:18:53.069944 1723 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:18:53.070111 kubelet[1723]: I1002 19:18:53.070096 1723 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:18:53.070000 audit[1751]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:53.070000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe08aa92e0 a2=0 a3=7ffe08aa92cc items=0 ppid=1723 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:18:53.071000 audit[1752]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:18:53.071000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9e8bf890 a2=0 a3=7ffc9e8bf87c items=0 ppid=1723 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:18:53.073495 kubelet[1723]: I1002 19:18:53.073444 1723 policy_none.go:49] "None policy: Start" Oct 2 19:18:53.074500 kubelet[1723]: I1002 19:18:53.074480 1723 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:18:53.074811 kubelet[1723]: I1002 19:18:53.074795 1723 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:18:53.074000 audit[1753]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:18:53.074000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc92756310 a2=0 a3=7ffc927562fc items=0 ppid=1723 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:18:53.083022 systemd[1]: Created slice kubepods.slice. Oct 2 19:18:53.089711 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:18:53.093842 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:18:53.100174 kubelet[1723]: I1002 19:18:53.100085 1723 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:18:53.098000 audit[1723]: AVC avc: denied { mac_admin } for pid=1723 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:53.098000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:18:53.098000 audit[1723]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f47830 a1=c000f1f6e0 a2=c000f47800 a3=25 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:53.098000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:18:53.100663 kubelet[1723]: I1002 19:18:53.100195 1723 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:18:53.100663 kubelet[1723]: I1002 19:18:53.100444 1723 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:18:53.102233 kubelet[1723]: E1002 19:18:53.102209 1723 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" not found" Oct 2 19:18:53.137840 kubelet[1723]: I1002 19:18:53.137796 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.138277 kubelet[1723]: E1002 19:18:53.138255 1723 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.165619 kubelet[1723]: I1002 19:18:53.165565 1723 topology_manager.go:215] "Topology Admit Handler" podUID="99c6d65ec4fca9a5b00dd6b4b5d75909" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.170994 kubelet[1723]: I1002 19:18:53.170945 1723 topology_manager.go:215] "Topology Admit Handler" podUID="75582c1874dc3870269f8191e8eda68b" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.176079 kubelet[1723]: I1002 19:18:53.176027 1723 topology_manager.go:215] "Topology Admit Handler" podUID="018651001db37e0eef3ac1faf9ce842e" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.182823 systemd[1]: Created slice kubepods-burstable-pod99c6d65ec4fca9a5b00dd6b4b5d75909.slice. Oct 2 19:18:53.199931 systemd[1]: Created slice kubepods-burstable-pod75582c1874dc3870269f8191e8eda68b.slice. Oct 2 19:18:53.206345 systemd[1]: Created slice kubepods-burstable-pod018651001db37e0eef3ac1faf9ce842e.slice. Oct 2 19:18:53.231847 kubelet[1723]: E1002 19:18:53.231805 1723 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="400ms" Oct 2 19:18:53.329407 kubelet[1723]: I1002 19:18:53.329262 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.329680 kubelet[1723]: I1002 19:18:53.329659 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.329841 kubelet[1723]: I1002 19:18:53.329824 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/018651001db37e0eef3ac1faf9ce842e-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"018651001db37e0eef3ac1faf9ce842e\") " pod="kube-system/kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.329983 kubelet[1723]: I1002 19:18:53.329969 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.330109 kubelet[1723]: I1002 19:18:53.330096 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.330309 kubelet[1723]: I1002 19:18:53.330280 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.330435 kubelet[1723]: I1002 19:18:53.330422 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.330563 kubelet[1723]: I1002 19:18:53.330549 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.330693 kubelet[1723]: I1002 19:18:53.330680 1723 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.345825 kubelet[1723]: I1002 19:18:53.345775 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.346224 kubelet[1723]: E1002 19:18:53.346189 1723 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.498082 env[1131]: time="2023-10-02T19:18:53.498014292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:99c6d65ec4fca9a5b00dd6b4b5d75909,Namespace:kube-system,Attempt:0,}" Oct 2 19:18:53.504811 env[1131]: time="2023-10-02T19:18:53.504744129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:75582c1874dc3870269f8191e8eda68b,Namespace:kube-system,Attempt:0,}" Oct 2 19:18:53.510302 env[1131]: time="2023-10-02T19:18:53.510245084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:018651001db37e0eef3ac1faf9ce842e,Namespace:kube-system,Attempt:0,}" Oct 2 19:18:53.632962 kubelet[1723]: E1002 19:18:53.632822 1723 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="800ms" Oct 2 19:18:53.758872 kubelet[1723]: I1002 19:18:53.758825 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:53.759298 kubelet[1723]: E1002 19:18:53.759257 1723 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:54.014660 kubelet[1723]: W1002 19:18:54.014488 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.014660 kubelet[1723]: E1002 19:18:54.014566 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.036014 kubelet[1723]: W1002 19:18:54.035912 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.036014 kubelet[1723]: E1002 19:18:54.036015 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.229337 kubelet[1723]: W1002 19:18:54.229261 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.229337 kubelet[1723]: E1002 19:18:54.229341 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.324284 kubelet[1723]: W1002 19:18:54.324111 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.324284 kubelet[1723]: E1002 19:18:54.324183 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:54.433843 kubelet[1723]: E1002 19:18:54.433761 1723 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="1.6s" Oct 2 19:18:54.564993 kubelet[1723]: I1002 19:18:54.564947 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:54.565432 kubelet[1723]: E1002 19:18:54.565387 1723 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:55.141957 kubelet[1723]: E1002 19:18:55.141906 1723 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.6:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.035429 kubelet[1723]: E1002 19:18:56.035323 1723 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.6:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.6:6443: connect: connection refused" interval="3.2s" Oct 2 19:18:56.174508 kubelet[1723]: I1002 19:18:56.174477 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:56.174979 kubelet[1723]: E1002 19:18:56.174930 1723 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.6:6443/api/v1/nodes\": dial tcp 10.128.0.6:6443: connect: connection refused" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:18:56.229694 kubelet[1723]: W1002 19:18:56.229631 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.229694 kubelet[1723]: E1002 19:18:56.229700 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.6:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.291839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1099614162.mount: Deactivated successfully. Oct 2 19:18:56.303121 env[1131]: time="2023-10-02T19:18:56.303036674Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.305202 env[1131]: time="2023-10-02T19:18:56.305121474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.309370 env[1131]: time="2023-10-02T19:18:56.309322190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.310482 env[1131]: time="2023-10-02T19:18:56.310444310Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.311983 env[1131]: time="2023-10-02T19:18:56.311939502Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.315616 env[1131]: time="2023-10-02T19:18:56.315567146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.316851 env[1131]: time="2023-10-02T19:18:56.316787817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.318270 env[1131]: time="2023-10-02T19:18:56.318223207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.320137 env[1131]: time="2023-10-02T19:18:56.320088123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.321008 env[1131]: time="2023-10-02T19:18:56.320949932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.321935 env[1131]: time="2023-10-02T19:18:56.321899393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.336744 env[1131]: time="2023-10-02T19:18:56.336664949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:56.390462 env[1131]: time="2023-10-02T19:18:56.390222131Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:56.390462 env[1131]: time="2023-10-02T19:18:56.390270925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:56.390462 env[1131]: time="2023-10-02T19:18:56.390290161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:56.391323 env[1131]: time="2023-10-02T19:18:56.391206641Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f6df756a3a919820fcd782fbbade3906cafaa102bc90a05e238e9a297fa17b5e pid=1762 runtime=io.containerd.runc.v2 Oct 2 19:18:56.395473 env[1131]: time="2023-10-02T19:18:56.395386079Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:56.395661 env[1131]: time="2023-10-02T19:18:56.395447075Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:56.395661 env[1131]: time="2023-10-02T19:18:56.395465466Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:56.395661 env[1131]: time="2023-10-02T19:18:56.395627537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f35f1265a11e9fc04466fe68a1a5bcddb6e8b6efc5e35f7885e43a27df3c470 pid=1780 runtime=io.containerd.runc.v2 Oct 2 19:18:56.405628 env[1131]: time="2023-10-02T19:18:56.405528906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:56.405829 env[1131]: time="2023-10-02T19:18:56.405585290Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:56.405829 env[1131]: time="2023-10-02T19:18:56.405637698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:56.406110 env[1131]: time="2023-10-02T19:18:56.406055975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/837531167c629e8dc813f2958f0cf2785efb15a01fa0973e8f2206528a9aef5f pid=1789 runtime=io.containerd.runc.v2 Oct 2 19:18:56.437006 systemd[1]: Started cri-containerd-f6df756a3a919820fcd782fbbade3906cafaa102bc90a05e238e9a297fa17b5e.scope. Oct 2 19:18:56.442049 systemd[1]: Started cri-containerd-6f35f1265a11e9fc04466fe68a1a5bcddb6e8b6efc5e35f7885e43a27df3c470.scope. Oct 2 19:18:56.473710 systemd[1]: Started cri-containerd-837531167c629e8dc813f2958f0cf2785efb15a01fa0973e8f2206528a9aef5f.scope. Oct 2 19:18:56.486944 kubelet[1723]: W1002 19:18:56.486860 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.488524 kubelet[1723]: E1002 19:18:56.488494 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.6:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.523111 kernel: kauditd_printk_skb: 217 callbacks suppressed Oct 2 19:18:56.523317 kernel: audit: type=1400 audit(1696274336.494:614): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.546181 kernel: audit: type=1400 audit(1696274336.494:615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.607126 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:18:56.607349 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:18:56.607394 kernel: audit: backlog limit exceeded Oct 2 19:18:56.607447 kernel: audit: type=1400 audit(1696274336.494:616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.607488 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:18:56.607521 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:18:56.607565 kernel: audit: backlog limit exceeded Oct 2 19:18:56.607597 kernel: audit: type=1400 audit(1696274336.494:617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.546000 audit: BPF prog-id=70 op=LOAD Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646637353661336139313938323066636437383266626261646533 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646637353661336139313938323066636437383266626261646533 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit: BPF prog-id=71 op=LOAD Oct 2 19:18:56.547000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031f7d0 items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646637353661336139313938323066636437383266626261646533 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit: BPF prog-id=72 op=LOAD Oct 2 19:18:56.547000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031f818 items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646637353661336139313938323066636437383266626261646533 Oct 2 19:18:56.547000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:18:56.547000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.547000 audit: BPF prog-id=73 op=LOAD Oct 2 19:18:56.547000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031fc28 items=0 ppid=1762 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636646637353661336139313938323066636437383266626261646533 Oct 2 19:18:56.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.629000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.631000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.631000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025000 items=0 ppid=1780 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333566313236356131316539666330343436366665363861316135 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit: BPF prog-id=77 op=LOAD Oct 2 19:18:56.643000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025048 items=0 ppid=1780 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333566313236356131316539666330343436366665363861316135 Oct 2 19:18:56.643000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:18:56.643000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.643000 audit: BPF prog-id=78 op=LOAD Oct 2 19:18:56.643000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025458 items=0 ppid=1780 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333566313236356131316539666330343436366665363861316135 Oct 2 19:18:56.629000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1789 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373533313136376336323965386463383133663239353866306366 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1789 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373533313136376336323965386463383133663239353866306366 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit: BPF prog-id=79 op=LOAD Oct 2 19:18:56.646000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a0340 items=0 ppid=1789 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373533313136376336323965386463383133663239353866306366 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit: BPF prog-id=80 op=LOAD Oct 2 19:18:56.646000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a0388 items=0 ppid=1789 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373533313136376336323965386463383133663239353866306366 Oct 2 19:18:56.646000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:18:56.646000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.646000 audit: BPF prog-id=81 op=LOAD Oct 2 19:18:56.646000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002a0798 items=0 ppid=1789 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373533313136376336323965386463383133663239353866306366 Oct 2 19:18:56.660744 kubelet[1723]: W1002 19:18:56.660648 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.660938 kubelet[1723]: E1002 19:18:56.660781 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.6:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.673966 env[1131]: time="2023-10-02T19:18:56.673904349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:75582c1874dc3870269f8191e8eda68b,Namespace:kube-system,Attempt:0,} returns sandbox id \"f6df756a3a919820fcd782fbbade3906cafaa102bc90a05e238e9a297fa17b5e\"" Oct 2 19:18:56.679602 kubelet[1723]: E1002 19:18:56.679565 1723 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flat" Oct 2 19:18:56.683223 env[1131]: time="2023-10-02T19:18:56.683169219Z" level=info msg="CreateContainer within sandbox \"f6df756a3a919820fcd782fbbade3906cafaa102bc90a05e238e9a297fa17b5e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:18:56.713918 env[1131]: time="2023-10-02T19:18:56.713850267Z" level=info msg="CreateContainer within sandbox \"f6df756a3a919820fcd782fbbade3906cafaa102bc90a05e238e9a297fa17b5e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"390d1af9677819aa8d6ed01382f54af242b53d75d60406d9775bf46b0269364e\"" Oct 2 19:18:56.714902 env[1131]: time="2023-10-02T19:18:56.714856857Z" level=info msg="StartContainer for \"390d1af9677819aa8d6ed01382f54af242b53d75d60406d9775bf46b0269364e\"" Oct 2 19:18:56.720084 env[1131]: time="2023-10-02T19:18:56.720019318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:018651001db37e0eef3ac1faf9ce842e,Namespace:kube-system,Attempt:0,} returns sandbox id \"6f35f1265a11e9fc04466fe68a1a5bcddb6e8b6efc5e35f7885e43a27df3c470\"" Oct 2 19:18:56.722065 kubelet[1723]: E1002 19:18:56.722031 1723 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-21291" Oct 2 19:18:56.724143 env[1131]: time="2023-10-02T19:18:56.724097438Z" level=info msg="CreateContainer within sandbox \"6f35f1265a11e9fc04466fe68a1a5bcddb6e8b6efc5e35f7885e43a27df3c470\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:18:56.740021 env[1131]: time="2023-10-02T19:18:56.739962592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal,Uid:99c6d65ec4fca9a5b00dd6b4b5d75909,Namespace:kube-system,Attempt:0,} returns sandbox id \"837531167c629e8dc813f2958f0cf2785efb15a01fa0973e8f2206528a9aef5f\"" Oct 2 19:18:56.745059 kubelet[1723]: E1002 19:18:56.743958 1723 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-21291" Oct 2 19:18:56.745869 systemd[1]: Started cri-containerd-390d1af9677819aa8d6ed01382f54af242b53d75d60406d9775bf46b0269364e.scope. Oct 2 19:18:56.750796 env[1131]: time="2023-10-02T19:18:56.750740721Z" level=info msg="CreateContainer within sandbox \"837531167c629e8dc813f2958f0cf2785efb15a01fa0973e8f2206528a9aef5f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:18:56.763297 env[1131]: time="2023-10-02T19:18:56.763232925Z" level=info msg="CreateContainer within sandbox \"6f35f1265a11e9fc04466fe68a1a5bcddb6e8b6efc5e35f7885e43a27df3c470\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"10675e653a77faa207230ba1c8588dcbbd04c53f4a44ad84994aaf78083c3c6a\"" Oct 2 19:18:56.764339 env[1131]: time="2023-10-02T19:18:56.764289879Z" level=info msg="StartContainer for \"10675e653a77faa207230ba1c8588dcbbd04c53f4a44ad84994aaf78083c3c6a\"" Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.780000 audit: BPF prog-id=82 op=LOAD Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306431616639363737383139616138643665643031333832663534 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306431616639363737383139616138643665643031333832663534 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.782000 audit: BPF prog-id=83 op=LOAD Oct 2 19:18:56.782000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ba230 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306431616639363737383139616138643665643031333832663534 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.784000 audit: BPF prog-id=84 op=LOAD Oct 2 19:18:56.784000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ba278 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306431616639363737383139616138643665643031333832663534 Oct 2 19:18:56.785000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:18:56.785000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.785000 audit: BPF prog-id=85 op=LOAD Oct 2 19:18:56.785000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ba688 items=0 ppid=1762 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306431616639363737383139616138643665643031333832663534 Oct 2 19:18:56.788710 env[1131]: time="2023-10-02T19:18:56.788628447Z" level=info msg="CreateContainer within sandbox \"837531167c629e8dc813f2958f0cf2785efb15a01fa0973e8f2206528a9aef5f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"dfcfb5c42880b0fd3ee1731e80c805d7cfd55f0dbf04e2efc10ef9c455787fc9\"" Oct 2 19:18:56.791379 env[1131]: time="2023-10-02T19:18:56.791339481Z" level=info msg="StartContainer for \"dfcfb5c42880b0fd3ee1731e80c805d7cfd55f0dbf04e2efc10ef9c455787fc9\"" Oct 2 19:18:56.795029 systemd[1]: Started cri-containerd-10675e653a77faa207230ba1c8588dcbbd04c53f4a44ad84994aaf78083c3c6a.scope. Oct 2 19:18:56.830899 systemd[1]: Started cri-containerd-dfcfb5c42880b0fd3ee1731e80c805d7cfd55f0dbf04e2efc10ef9c455787fc9.scope. Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.842000 audit: BPF prog-id=86 op=LOAD Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363735653635336137376661613230373233306261316338353838 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363735653635336137376661613230373233306261316338353838 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit: BPF prog-id=87 op=LOAD Oct 2 19:18:56.844000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034e8d0 items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363735653635336137376661613230373233306261316338353838 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit: BPF prog-id=88 op=LOAD Oct 2 19:18:56.844000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034e918 items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363735653635336137376661613230373233306261316338353838 Oct 2 19:18:56.844000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:18:56.844000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { perfmon } for pid=1912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit[1912]: AVC avc: denied { bpf } for pid=1912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.844000 audit: BPF prog-id=89 op=LOAD Oct 2 19:18:56.844000 audit[1912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034ed28 items=0 ppid=1780 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363735653635336137376661613230373233306261316338353838 Oct 2 19:18:56.905573 kubelet[1723]: W1002 19:18:56.905480 1723 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.905573 kubelet[1723]: E1002 19:18:56.905573 1723 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.6:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.6:6443: connect: connection refused Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.912000 audit: BPF prog-id=90 op=LOAD Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1789 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636662356334323838306230666433656531373331653830633830 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1789 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636662356334323838306230666433656531373331653830633830 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit: BPF prog-id=91 op=LOAD Oct 2 19:18:56.913000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000210560 items=0 ppid=1789 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636662356334323838306230666433656531373331653830633830 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.913000 audit: BPF prog-id=92 op=LOAD Oct 2 19:18:56.913000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002105a8 items=0 ppid=1789 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636662356334323838306230666433656531373331653830633830 Oct 2 19:18:56.914000 audit: BPF prog-id=92 op=UNLOAD Oct 2 19:18:56.914000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:56.914000 audit: BPF prog-id=93 op=LOAD Oct 2 19:18:56.914000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002109b8 items=0 ppid=1789 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:56.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466636662356334323838306230666433656531373331653830633830 Oct 2 19:18:56.929509 env[1131]: time="2023-10-02T19:18:56.929455795Z" level=info msg="StartContainer for \"390d1af9677819aa8d6ed01382f54af242b53d75d60406d9775bf46b0269364e\" returns successfully" Oct 2 19:18:56.933287 env[1131]: time="2023-10-02T19:18:56.933222068Z" level=info msg="StartContainer for \"10675e653a77faa207230ba1c8588dcbbd04c53f4a44ad84994aaf78083c3c6a\" returns successfully" Oct 2 19:18:57.007491 env[1131]: time="2023-10-02T19:18:57.007428058Z" level=info msg="StartContainer for \"dfcfb5c42880b0fd3ee1731e80c805d7cfd55f0dbf04e2efc10ef9c455787fc9\" returns successfully" Oct 2 19:18:59.384559 kubelet[1723]: I1002 19:18:59.384514 1723 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:00.056000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.056000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a24cc0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:00.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:00.059000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.059000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001228480 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:00.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:00.316000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.316000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00759ef00 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.316000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.316000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0067eca40 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.318000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.318000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00759f020 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.335000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.335000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c005bf3ce0 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.335000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.335000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007186d80 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.337000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:00.337000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007187c20 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:19:00.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:19:00.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.6:22-34.172.82.151:55610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:00.481847 systemd[1]: Started sshd@7-10.128.0.6:22-34.172.82.151:55610.service. Oct 2 19:19:00.563701 kubelet[1723]: E1002 19:19:00.563652 1723 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" not found" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:00.583168 sshd[1994]: Invalid user linux5 from 34.172.82.151 port 55610 Oct 2 19:19:00.593000 audit[1994]: USER_AUTH pid=1994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="linux5" exe="/usr/sbin/sshd" hostname=34.172.82.151 addr=34.172.82.151 terminal=ssh res=failed' Oct 2 19:19:00.595115 sshd[1994]: Failed password for invalid user linux5 from 34.172.82.151 port 55610 ssh2 Oct 2 19:19:00.658607 kubelet[1723]: I1002 19:19:00.658543 1723 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:00.764412 sshd[1994]: Received disconnect from 34.172.82.151 port 55610:11: Bye Bye [preauth] Oct 2 19:19:00.764609 sshd[1994]: Disconnected from invalid user linux5 34.172.82.151 port 55610 [preauth] Oct 2 19:19:00.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.6:22-34.172.82.151:55610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:00.766496 systemd[1]: sshd@7-10.128.0.6:22-34.172.82.151:55610.service: Deactivated successfully. Oct 2 19:19:01.010437 kubelet[1723]: I1002 19:19:01.010389 1723 apiserver.go:52] "Watching apiserver" Oct 2 19:19:01.028861 kubelet[1723]: I1002 19:19:01.028817 1723 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:19:03.124471 systemd[1]: Reloading. Oct 2 19:19:03.266984 /usr/lib/systemd/system-generators/torcx-generator[2022]: time="2023-10-02T19:19:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:19:03.268623 /usr/lib/systemd/system-generators/torcx-generator[2022]: time="2023-10-02T19:19:03Z" level=info msg="torcx already run" Oct 2 19:19:03.360444 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:19:03.360474 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:19:03.391099 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:19:03.539478 kernel: kauditd_printk_skb: 409 callbacks suppressed Oct 2 19:19:03.539643 kernel: audit: type=1400 audit(1696274343.511:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.570314 kernel: audit: type=1400 audit(1696274343.511:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.570426 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:19:03.607908 kernel: audit: type=1400 audit(1696274343.511:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.608061 kernel: audit: audit_lost=28 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:19:03.608130 kernel: audit: backlog limit exceeded Oct 2 19:19:03.608178 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.634904 kernel: audit: type=1400 audit(1696274343.511:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.635086 kernel: audit: audit_lost=29 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.662756 kernel: audit: type=1400 audit(1696274343.511:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.538000 audit: BPF prog-id=94 op=LOAD Oct 2 19:19:03.538000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.539000 audit: BPF prog-id=95 op=LOAD Oct 2 19:19:03.539000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.542000 audit: BPF prog-id=96 op=LOAD Oct 2 19:19:03.542000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.543000 audit: BPF prog-id=97 op=LOAD Oct 2 19:19:03.543000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit: BPF prog-id=98 op=LOAD Oct 2 19:19:03.568000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.641000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:19:03.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.664000 audit: BPF prog-id=104 op=LOAD Oct 2 19:19:03.665000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit: BPF prog-id=105 op=LOAD Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.665000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit: BPF prog-id=107 op=LOAD Oct 2 19:19:03.670000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.670000 audit: BPF prog-id=108 op=LOAD Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit: BPF prog-id=109 op=LOAD Oct 2 19:19:03.671000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:19:03.671000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.671000 audit: BPF prog-id=110 op=LOAD Oct 2 19:19:03.671000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit: BPF prog-id=111 op=LOAD Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.675000 audit: BPF prog-id=112 op=LOAD Oct 2 19:19:03.675000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:19:03.675000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.678000 audit: BPF prog-id=113 op=LOAD Oct 2 19:19:03.678000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.681000 audit: BPF prog-id=114 op=LOAD Oct 2 19:19:03.681000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:19:03.703963 systemd[1]: Stopping kubelet.service... Oct 2 19:19:03.704963 kubelet[1723]: I1002 19:19:03.704932 1723 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:19:03.729926 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:19:03.730258 systemd[1]: Stopped kubelet.service. Oct 2 19:19:03.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:03.730356 systemd[1]: kubelet.service: Consumed 1.453s CPU time. Oct 2 19:19:03.733295 systemd[1]: Started kubelet.service. Oct 2 19:19:03.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:03.842294 kubelet[2063]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:03.842841 kubelet[2063]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:19:03.842938 kubelet[2063]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:03.843177 kubelet[2063]: I1002 19:19:03.843113 2063 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:19:03.851945 kubelet[2063]: I1002 19:19:03.851885 2063 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:19:03.851945 kubelet[2063]: I1002 19:19:03.851919 2063 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:19:03.852430 kubelet[2063]: I1002 19:19:03.852390 2063 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:19:03.859197 kubelet[2063]: I1002 19:19:03.855793 2063 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:19:03.859197 kubelet[2063]: I1002 19:19:03.858921 2063 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:19:03.869912 kubelet[2063]: I1002 19:19:03.869871 2063 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:19:03.870237 kubelet[2063]: I1002 19:19:03.870211 2063 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:19:03.870539 kubelet[2063]: I1002 19:19:03.870498 2063 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870550 2063 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870566 2063 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870613 2063 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870741 2063 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870768 2063 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:19:03.870799 kubelet[2063]: I1002 19:19:03.870802 2063 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:19:03.871098 kubelet[2063]: I1002 19:19:03.870827 2063 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:19:03.872435 kubelet[2063]: I1002 19:19:03.872407 2063 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:19:03.907944 kubelet[2063]: I1002 19:19:03.907909 2063 server.go:1232] "Started kubelet" Oct 2 19:19:03.914140 kubelet[2063]: I1002 19:19:03.914009 2063 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:19:03.915944 kubelet[2063]: I1002 19:19:03.915917 2063 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:19:03.922000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.922000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:03.922000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008da9f0 a1=c0002666c0 a2=c0008da9c0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:03.922000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:03.926264 kubelet[2063]: I1002 19:19:03.926240 2063 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:19:03.926467 kubelet[2063]: I1002 19:19:03.923427 2063 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:19:03.925000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:03.925000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:03.925000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad04e0 a1=c000cb0078 a2=c000043fb0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:03.925000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:03.927046 kubelet[2063]: I1002 19:19:03.927029 2063 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:19:03.927189 kubelet[2063]: I1002 19:19:03.927176 2063 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:19:03.947086 kubelet[2063]: I1002 19:19:03.947038 2063 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:19:03.948136 kubelet[2063]: I1002 19:19:03.948096 2063 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:19:03.948571 kubelet[2063]: I1002 19:19:03.948555 2063 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:19:03.949505 kubelet[2063]: E1002 19:19:03.949468 2063 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:19:03.949691 kubelet[2063]: E1002 19:19:03.949674 2063 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:19:03.963755 kubelet[2063]: I1002 19:19:03.963716 2063 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:19:04.001338 kubelet[2063]: I1002 19:19:04.001292 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:19:04.019637 kubelet[2063]: I1002 19:19:04.019590 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:19:04.019637 kubelet[2063]: I1002 19:19:04.019642 2063 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:19:04.019863 kubelet[2063]: I1002 19:19:04.019673 2063 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:19:04.019863 kubelet[2063]: E1002 19:19:04.019750 2063 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:19:04.068394 kubelet[2063]: I1002 19:19:04.068353 2063 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.108881 kubelet[2063]: I1002 19:19:04.108833 2063 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.109093 kubelet[2063]: I1002 19:19:04.108952 2063 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.123281 kubelet[2063]: E1002 19:19:04.123229 2063 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:19:04.126115 kubelet[2063]: I1002 19:19:04.126078 2063 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:19:04.126115 kubelet[2063]: I1002 19:19:04.126111 2063 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:19:04.126360 kubelet[2063]: I1002 19:19:04.126136 2063 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:04.126417 kubelet[2063]: I1002 19:19:04.126381 2063 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:19:04.126417 kubelet[2063]: I1002 19:19:04.126415 2063 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:19:04.126507 kubelet[2063]: I1002 19:19:04.126426 2063 policy_none.go:49] "None policy: Start" Oct 2 19:19:04.128414 kubelet[2063]: I1002 19:19:04.128380 2063 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:19:04.128414 kubelet[2063]: I1002 19:19:04.128421 2063 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:19:04.128649 kubelet[2063]: I1002 19:19:04.128631 2063 state_mem.go:75] "Updated machine memory state" Oct 2 19:19:04.137649 kubelet[2063]: I1002 19:19:04.137623 2063 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:19:04.140000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:04.140000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:04.140000 audit[2063]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f0b110 a1=c00129be48 a2=c000f0b0e0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:04.140000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:04.143496 kubelet[2063]: I1002 19:19:04.143475 2063 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:19:04.144238 kubelet[2063]: I1002 19:19:04.144218 2063 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:19:04.193001 update_engine[1121]: I1002 19:19:04.192858 1121 update_attempter.cc:505] Updating boot flags... Oct 2 19:19:04.328207 kubelet[2063]: I1002 19:19:04.323941 2063 topology_manager.go:215] "Topology Admit Handler" podUID="99c6d65ec4fca9a5b00dd6b4b5d75909" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.328207 kubelet[2063]: I1002 19:19:04.324384 2063 topology_manager.go:215] "Topology Admit Handler" podUID="75582c1874dc3870269f8191e8eda68b" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.328207 kubelet[2063]: I1002 19:19:04.324504 2063 topology_manager.go:215] "Topology Admit Handler" podUID="018651001db37e0eef3ac1faf9ce842e" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.349768 kubelet[2063]: W1002 19:19:04.348834 2063 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:19:04.349768 kubelet[2063]: W1002 19:19:04.349216 2063 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:19:04.356887 kubelet[2063]: W1002 19:19:04.356582 2063 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Oct 2 19:19:04.363758 kubelet[2063]: I1002 19:19:04.363212 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.363758 kubelet[2063]: I1002 19:19:04.363369 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.363758 kubelet[2063]: I1002 19:19:04.363452 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.363758 kubelet[2063]: I1002 19:19:04.363532 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.364127 kubelet[2063]: I1002 19:19:04.363622 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/99c6d65ec4fca9a5b00dd6b4b5d75909-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"99c6d65ec4fca9a5b00dd6b4b5d75909\") " pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.364127 kubelet[2063]: I1002 19:19:04.363709 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.365203 kubelet[2063]: I1002 19:19:04.364927 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.365203 kubelet[2063]: I1002 19:19:04.365016 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/75582c1874dc3870269f8191e8eda68b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"75582c1874dc3870269f8191e8eda68b\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.365203 kubelet[2063]: I1002 19:19:04.365090 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/018651001db37e0eef3ac1faf9ce842e-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal\" (UID: \"018651001db37e0eef3ac1faf9ce842e\") " pod="kube-system/kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:04.896557 kubelet[2063]: I1002 19:19:04.896514 2063 apiserver.go:52] "Watching apiserver" Oct 2 19:19:04.949256 kubelet[2063]: I1002 19:19:04.949199 2063 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:19:05.113994 kubelet[2063]: I1002 19:19:05.113939 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" podStartSLOduration=1.113859172 podCreationTimestamp="2023-10-02 19:19:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:05.100616648 +0000 UTC m=+1.359496712" watchObservedRunningTime="2023-10-02 19:19:05.113859172 +0000 UTC m=+1.372739240" Oct 2 19:19:05.128158 kubelet[2063]: I1002 19:19:05.128089 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" podStartSLOduration=1.128001019 podCreationTimestamp="2023-10-02 19:19:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:05.115314154 +0000 UTC m=+1.374194224" watchObservedRunningTime="2023-10-02 19:19:05.128001019 +0000 UTC m=+1.386881082" Oct 2 19:19:05.151190 kubelet[2063]: I1002 19:19:05.151038 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" podStartSLOduration=1.150879629 podCreationTimestamp="2023-10-02 19:19:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:05.131537265 +0000 UTC m=+1.390417327" watchObservedRunningTime="2023-10-02 19:19:05.150879629 +0000 UTC m=+1.409759693" Oct 2 19:19:10.099896 sudo[1340]: pam_unix(sudo:session): session closed for user root Oct 2 19:19:10.098000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:10.107262 kernel: kauditd_printk_skb: 352 callbacks suppressed Oct 2 19:19:10.107388 kernel: audit: type=1106 audit(1696274350.098:913): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:10.098000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:10.154241 kernel: audit: type=1104 audit(1696274350.098:914): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:10.153972 sshd[1337]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:10.158324 systemd[1]: sshd@6-10.128.0.6:22-147.75.109.163:49472.service: Deactivated successfully. Oct 2 19:19:10.160675 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:19:10.160941 systemd[1]: session-7.scope: Consumed 5.484s CPU time. Oct 2 19:19:10.154000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:19:10.166503 systemd-logind[1119]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:19:10.168382 systemd-logind[1119]: Removed session 7. Oct 2 19:19:10.155000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:19:10.219935 kernel: audit: type=1106 audit(1696274350.154:915): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:19:10.220117 kernel: audit: type=1104 audit(1696274350.155:916): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:19:10.220174 kernel: audit: type=1131 audit(1696274350.157:917): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-147.75.109.163:49472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:10.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.6:22-147.75.109.163:49472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:15.213000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:19:15.213000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012a7100 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.276626 kernel: audit: type=1400 audit(1696274355.213:918): avc: denied { watch } for pid=1898 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:19:15.276833 kernel: audit: type=1300 audit(1696274355.213:918): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012a7100 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.276886 kernel: audit: type=1327 audit(1696274355.213:918): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.341000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.369194 kernel: audit: type=1400 audit(1696274355.341:919): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.369357 kernel: audit: type=1400 audit(1696274355.347:920): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.347000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.396214 kernel: audit: type=1300 audit(1696274355.347:920): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00149be20 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.347000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00149be20 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.459185 kernel: audit: type=1327 audit(1696274355.347:920): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.459366 kernel: audit: type=1400 audit(1696274355.347:921): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.347000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.347000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00149be60 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.520915 kernel: audit: type=1300 audit(1696274355.347:921): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00149be60 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.521111 kernel: audit: type=1327 audit(1696274355.347:921): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.347000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:15.347000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00149bea0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.341000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001367be0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:19:15.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:15.625019 kubelet[2063]: I1002 19:19:15.624623 2063 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:19:15.626630 kubelet[2063]: I1002 19:19:15.625776 2063 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:19:15.626712 env[1131]: time="2023-10-02T19:19:15.625374799Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:19:15.626866 systemd[1]: Started sshd@8-10.128.0.6:22-119.29.156.147:36610.service. Oct 2 19:19:15.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.6:22-119.29.156.147:36610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:16.415625 kubelet[2063]: I1002 19:19:16.415578 2063 topology_manager.go:215] "Topology Admit Handler" podUID="c7f76274-38a1-4288-bc9c-1add19eb7656" podNamespace="kube-system" podName="kube-proxy-n6557" Oct 2 19:19:16.425851 systemd[1]: Created slice kubepods-besteffort-podc7f76274_38a1_4288_bc9c_1add19eb7656.slice. Oct 2 19:19:16.447835 kubelet[2063]: I1002 19:19:16.447786 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c7f76274-38a1-4288-bc9c-1add19eb7656-lib-modules\") pod \"kube-proxy-n6557\" (UID: \"c7f76274-38a1-4288-bc9c-1add19eb7656\") " pod="kube-system/kube-proxy-n6557" Oct 2 19:19:16.448266 kubelet[2063]: I1002 19:19:16.448199 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrjht\" (UniqueName: \"kubernetes.io/projected/c7f76274-38a1-4288-bc9c-1add19eb7656-kube-api-access-wrjht\") pod \"kube-proxy-n6557\" (UID: \"c7f76274-38a1-4288-bc9c-1add19eb7656\") " pod="kube-system/kube-proxy-n6557" Oct 2 19:19:16.448515 kubelet[2063]: I1002 19:19:16.448490 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c7f76274-38a1-4288-bc9c-1add19eb7656-kube-proxy\") pod \"kube-proxy-n6557\" (UID: \"c7f76274-38a1-4288-bc9c-1add19eb7656\") " pod="kube-system/kube-proxy-n6557" Oct 2 19:19:16.448755 kubelet[2063]: I1002 19:19:16.448736 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c7f76274-38a1-4288-bc9c-1add19eb7656-xtables-lock\") pod \"kube-proxy-n6557\" (UID: \"c7f76274-38a1-4288-bc9c-1add19eb7656\") " pod="kube-system/kube-proxy-n6557" Oct 2 19:19:16.531614 kubelet[2063]: I1002 19:19:16.531575 2063 topology_manager.go:215] "Topology Admit Handler" podUID="60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-znxz2" Oct 2 19:19:16.540571 systemd[1]: Created slice kubepods-besteffort-pod60b29cfe_1b98_4ed3_a952_b8f5cb8e1e2b.slice. Oct 2 19:19:16.650364 kubelet[2063]: I1002 19:19:16.650298 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m4c6z\" (UniqueName: \"kubernetes.io/projected/60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b-kube-api-access-m4c6z\") pod \"tigera-operator-8547bd6cc6-znxz2\" (UID: \"60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b\") " pod="tigera-operator/tigera-operator-8547bd6cc6-znxz2" Oct 2 19:19:16.650364 kubelet[2063]: I1002 19:19:16.650367 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-znxz2\" (UID: \"60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b\") " pod="tigera-operator/tigera-operator-8547bd6cc6-znxz2" Oct 2 19:19:16.734444 env[1131]: time="2023-10-02T19:19:16.734293954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n6557,Uid:c7f76274-38a1-4288-bc9c-1add19eb7656,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:16.767813 env[1131]: time="2023-10-02T19:19:16.767717791Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:16.768012 env[1131]: time="2023-10-02T19:19:16.767828593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:16.768012 env[1131]: time="2023-10-02T19:19:16.767867419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:16.768173 env[1131]: time="2023-10-02T19:19:16.768056999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8362688824846abe71c4f5bc1011ca2c7b8edeb24da41e836ca36b4777faccd pid=2161 runtime=io.containerd.runc.v2 Oct 2 19:19:16.799824 systemd[1]: Started cri-containerd-b8362688824846abe71c4f5bc1011ca2c7b8edeb24da41e836ca36b4777faccd.scope. Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.828000 audit: BPF prog-id=115 op=LOAD Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333632363838383234383436616265373163346635626331303131 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333632363838383234383436616265373163346635626331303131 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit: BPF prog-id=116 op=LOAD Oct 2 19:19:16.829000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028cc30 items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333632363838383234383436616265373163346635626331303131 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit: BPF prog-id=117 op=LOAD Oct 2 19:19:16.829000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028cc78 items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333632363838383234383436616265373163346635626331303131 Oct 2 19:19:16.829000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:19:16.829000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { perfmon } for pid=2173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit[2173]: AVC avc: denied { bpf } for pid=2173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.829000 audit: BPF prog-id=118 op=LOAD Oct 2 19:19:16.829000 audit[2173]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028d088 items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238333632363838383234383436616265373163346635626331303131 Oct 2 19:19:16.849994 env[1131]: time="2023-10-02T19:19:16.849932129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n6557,Uid:c7f76274-38a1-4288-bc9c-1add19eb7656,Namespace:kube-system,Attempt:0,} returns sandbox id \"b8362688824846abe71c4f5bc1011ca2c7b8edeb24da41e836ca36b4777faccd\"" Oct 2 19:19:16.850620 env[1131]: time="2023-10-02T19:19:16.850037990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-znxz2,Uid:60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:19:16.857102 env[1131]: time="2023-10-02T19:19:16.856449762Z" level=info msg="CreateContainer within sandbox \"b8362688824846abe71c4f5bc1011ca2c7b8edeb24da41e836ca36b4777faccd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:19:16.880641 env[1131]: time="2023-10-02T19:19:16.880593735Z" level=info msg="CreateContainer within sandbox \"b8362688824846abe71c4f5bc1011ca2c7b8edeb24da41e836ca36b4777faccd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"56351e31065e9ff0287d8d5cd5d5537d52eaba50f6364c366d239f6a0f3da695\"" Oct 2 19:19:16.884486 env[1131]: time="2023-10-02T19:19:16.884443924Z" level=info msg="StartContainer for \"56351e31065e9ff0287d8d5cd5d5537d52eaba50f6364c366d239f6a0f3da695\"" Oct 2 19:19:16.891217 env[1131]: time="2023-10-02T19:19:16.890962349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:16.891217 env[1131]: time="2023-10-02T19:19:16.891019563Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:16.891217 env[1131]: time="2023-10-02T19:19:16.891041164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:16.892481 env[1131]: time="2023-10-02T19:19:16.892384776Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8135dedfbbd00b8c327812944339360969ba6950a0f10f464f4ad9e60839a8c4 pid=2204 runtime=io.containerd.runc.v2 Oct 2 19:19:16.912798 systemd[1]: Started cri-containerd-8135dedfbbd00b8c327812944339360969ba6950a0f10f464f4ad9e60839a8c4.scope. Oct 2 19:19:16.919468 systemd[1]: Started cri-containerd-56351e31065e9ff0287d8d5cd5d5537d52eaba50f6364c366d239f6a0f3da695.scope. Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.951000 audit: BPF prog-id=119 op=LOAD Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333564656466626264303062386333323738313239343433333933 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333564656466626264303062386333323738313239343433333933 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit: BPF prog-id=120 op=LOAD Oct 2 19:19:16.952000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ce6a0 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333564656466626264303062386333323738313239343433333933 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.952000 audit: BPF prog-id=121 op=LOAD Oct 2 19:19:16.952000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ce6e8 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333564656466626264303062386333323738313239343433333933 Oct 2 19:19:16.953000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:19:16.953000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.953000 audit: BPF prog-id=122 op=LOAD Oct 2 19:19:16.953000 audit[2223]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ceaf8 items=0 ppid=2204 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831333564656466626264303062386333323738313239343433333933 Oct 2 19:19:16.974000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.974000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531653331303635653966663032383764386435636435643535 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.975000 audit: BPF prog-id=123 op=LOAD Oct 2 19:19:16.975000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000216810 items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531653331303635653966663032383764386435636435643535 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.976000 audit: BPF prog-id=124 op=LOAD Oct 2 19:19:16.976000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000216858 items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531653331303635653966663032383764386435636435643535 Oct 2 19:19:16.977000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:19:16.977000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:16.977000 audit: BPF prog-id=125 op=LOAD Oct 2 19:19:16.977000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002168e8 items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:16.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536333531653331303635653966663032383764386435636435643535 Oct 2 19:19:16.992214 sshd[2150]: Invalid user judith from 119.29.156.147 port 36610 Oct 2 19:19:17.005000 audit[2150]: USER_AUTH pid=2150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="judith" exe="/usr/sbin/sshd" hostname=119.29.156.147 addr=119.29.156.147 terminal=ssh res=failed' Oct 2 19:19:17.009074 sshd[2150]: Failed password for invalid user judith from 119.29.156.147 port 36610 ssh2 Oct 2 19:19:17.026082 env[1131]: time="2023-10-02T19:19:17.025784540Z" level=info msg="StartContainer for \"56351e31065e9ff0287d8d5cd5d5537d52eaba50f6364c366d239f6a0f3da695\" returns successfully" Oct 2 19:19:17.043069 env[1131]: time="2023-10-02T19:19:17.042863905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-znxz2,Uid:60b29cfe-1b98-4ed3-a952-b8f5cb8e1e2b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8135dedfbbd00b8c327812944339360969ba6950a0f10f464f4ad9e60839a8c4\"" Oct 2 19:19:17.050224 kubelet[2063]: E1002 19:19:17.049879 2063 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:19:17.050731 env[1131]: time="2023-10-02T19:19:17.050687868Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:19:17.100653 kubelet[2063]: I1002 19:19:17.100607 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-n6557" podStartSLOduration=1.100552809 podCreationTimestamp="2023-10-02 19:19:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:17.099569949 +0000 UTC m=+13.358450015" watchObservedRunningTime="2023-10-02 19:19:17.100552809 +0000 UTC m=+13.359432873" Oct 2 19:19:17.149000 audit[2296]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.149000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea8fc72e0 a2=0 a3=7ffea8fc72cc items=0 ppid=2249 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:19:17.158000 audit[2297]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.158000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd5be4e0 a2=0 a3=7fffcd5be4cc items=0 ppid=2249 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:19:17.159000 audit[2298]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.159000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc793d37f0 a2=0 a3=7ffc793d37dc items=0 ppid=2249 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:19:17.161000 audit[2299]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.161000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb217aac0 a2=0 a3=7fffb217aaac items=0 ppid=2249 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:19:17.162000 audit[2300]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.162000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd76d9db20 a2=0 a3=7ffd76d9db0c items=0 ppid=2249 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:19:17.163000 audit[2301]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.163000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc092f640 a2=0 a3=7fffc092f62c items=0 ppid=2249 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:19:17.253000 audit[2302]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.253000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe04f1ac80 a2=0 a3=7ffe04f1ac6c items=0 ppid=2249 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:19:17.258000 audit[2304]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.258000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed6b0f140 a2=0 a3=7ffed6b0f12c items=0 ppid=2249 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:19:17.264000 audit[2307]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.264000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffb2c554f0 a2=0 a3=7fffb2c554dc items=0 ppid=2249 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:19:17.266000 audit[2308]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.266000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9e49a3e0 a2=0 a3=7ffe9e49a3cc items=0 ppid=2249 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:19:17.270000 audit[2310]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.270000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4bf1c190 a2=0 a3=7ffc4bf1c17c items=0 ppid=2249 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:19:17.271000 audit[2311]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.271000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff14b3dfc0 a2=0 a3=7fff14b3dfac items=0 ppid=2249 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:19:17.274577 sshd[2150]: Received disconnect from 119.29.156.147 port 36610:11: Bye Bye [preauth] Oct 2 19:19:17.274577 sshd[2150]: Disconnected from invalid user judith 119.29.156.147 port 36610 [preauth] Oct 2 19:19:17.276624 systemd[1]: sshd@8-10.128.0.6:22-119.29.156.147:36610.service: Deactivated successfully. Oct 2 19:19:17.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.6:22-119.29.156.147:36610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:17.281000 audit[2314]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.281000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefec78880 a2=0 a3=7ffefec7886c items=0 ppid=2249 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:19:17.288000 audit[2317]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.288000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc30ac0440 a2=0 a3=7ffc30ac042c items=0 ppid=2249 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:19:17.289000 audit[2318]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.289000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd595c3280 a2=0 a3=7ffd595c326c items=0 ppid=2249 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:19:17.293000 audit[2320]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.293000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe841e5420 a2=0 a3=7ffe841e540c items=0 ppid=2249 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:19:17.295000 audit[2321]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.295000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc231ae770 a2=0 a3=7ffc231ae75c items=0 ppid=2249 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:19:17.300000 audit[2323]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.300000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe99eba350 a2=0 a3=7ffe99eba33c items=0 ppid=2249 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:19:17.305000 audit[2326]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.305000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff06f68700 a2=0 a3=7fff06f686ec items=0 ppid=2249 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:19:17.311000 audit[2329]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.311000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec4ee8680 a2=0 a3=7ffec4ee866c items=0 ppid=2249 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:19:17.313000 audit[2330]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.313000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd26ec2110 a2=0 a3=7ffd26ec20fc items=0 ppid=2249 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:19:17.316000 audit[2332]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.316000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc6843f0f0 a2=0 a3=7ffc6843f0dc items=0 ppid=2249 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:19:17.321000 audit[2335]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.321000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc32950dd0 a2=0 a3=7ffc32950dbc items=0 ppid=2249 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:19:17.324000 audit[2336]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.324000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd92e21770 a2=0 a3=7ffd92e2175c items=0 ppid=2249 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:19:17.327000 audit[2338]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:17.327000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe28dbedb0 a2=0 a3=7ffe28dbed9c items=0 ppid=2249 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:19:17.357000 audit[2344]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:17.357000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd2d79c940 a2=0 a3=7ffd2d79c92c items=0 ppid=2249 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:17.365000 audit[2344]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:17.365000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd2d79c940 a2=0 a3=7ffd2d79c92c items=0 ppid=2249 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:17.368000 audit[2350]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.368000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3bb098e0 a2=0 a3=7ffc3bb098cc items=0 ppid=2249 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:19:17.372000 audit[2352]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.372000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef1d7c790 a2=0 a3=7ffef1d7c77c items=0 ppid=2249 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:19:17.378000 audit[2355]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.378000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc67496320 a2=0 a3=7ffc6749630c items=0 ppid=2249 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:19:17.380000 audit[2356]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.380000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc7680320 a2=0 a3=7ffdc768030c items=0 ppid=2249 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:19:17.384000 audit[2358]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.384000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0d8c9970 a2=0 a3=7ffe0d8c995c items=0 ppid=2249 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:19:17.386000 audit[2359]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.386000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff62ff6d60 a2=0 a3=7fff62ff6d4c items=0 ppid=2249 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:19:17.389000 audit[2361]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.389000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc0715530 a2=0 a3=7ffdc071551c items=0 ppid=2249 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:19:17.394000 audit[2364]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.394000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff01f96f60 a2=0 a3=7fff01f96f4c items=0 ppid=2249 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:19:17.396000 audit[2365]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.396000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6d2949f0 a2=0 a3=7ffd6d2949dc items=0 ppid=2249 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:19:17.401000 audit[2368]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.401000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc01cc370 a2=0 a3=7ffcc01cc35c items=0 ppid=2249 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:19:17.403000 audit[2369]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.403000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe567bb710 a2=0 a3=7ffe567bb6fc items=0 ppid=2249 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:19:17.407000 audit[2371]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.407000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf9b58920 a2=0 a3=7ffdf9b5890c items=0 ppid=2249 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:19:17.413000 audit[2374]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.413000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7651ee10 a2=0 a3=7ffc7651edfc items=0 ppid=2249 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:19:17.418000 audit[2377]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.418000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9f1d79e0 a2=0 a3=7ffc9f1d79cc items=0 ppid=2249 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:19:17.420000 audit[2378]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.420000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe760a350 a2=0 a3=7fffe760a33c items=0 ppid=2249 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:19:17.423000 audit[2380]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.423000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffbf5172a0 a2=0 a3=7fffbf51728c items=0 ppid=2249 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:19:17.428000 audit[2383]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.428000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff8b56c680 a2=0 a3=7fff8b56c66c items=0 ppid=2249 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:19:17.430000 audit[2384]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.430000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe563a8fe0 a2=0 a3=7ffe563a8fcc items=0 ppid=2249 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:19:17.433000 audit[2386]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.433000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff12433310 a2=0 a3=7fff124332fc items=0 ppid=2249 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:19:17.435000 audit[2387]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.435000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffed7656c0 a2=0 a3=7fffed7656ac items=0 ppid=2249 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:19:17.439000 audit[2389]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.439000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff11e454e0 a2=0 a3=7fff11e454cc items=0 ppid=2249 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:19:17.444000 audit[2392]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:17.444000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd7357250 a2=0 a3=7ffcd735723c items=0 ppid=2249 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:19:17.448000 audit[2394]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:19:17.448000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff00615cf0 a2=0 a3=7fff00615cdc items=0 ppid=2249 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.448000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:17.449000 audit[2394]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:19:17.449000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff00615cf0 a2=0 a3=7fff00615cdc items=0 ppid=2249 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:17.449000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:17.848983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2767030989.mount: Deactivated successfully. Oct 2 19:19:18.998953 env[1131]: time="2023-10-02T19:19:18.998880001Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:19.002261 env[1131]: time="2023-10-02T19:19:19.002211348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:19.005077 env[1131]: time="2023-10-02T19:19:19.005022929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:19.007815 env[1131]: time="2023-10-02T19:19:19.007766421Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:19.008782 env[1131]: time="2023-10-02T19:19:19.008723866Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:19:19.013870 env[1131]: time="2023-10-02T19:19:19.013785480Z" level=info msg="CreateContainer within sandbox \"8135dedfbbd00b8c327812944339360969ba6950a0f10f464f4ad9e60839a8c4\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:19:19.031111 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1783246606.mount: Deactivated successfully. Oct 2 19:19:19.038739 env[1131]: time="2023-10-02T19:19:19.038678519Z" level=info msg="CreateContainer within sandbox \"8135dedfbbd00b8c327812944339360969ba6950a0f10f464f4ad9e60839a8c4\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"92ab9cab44ee9e0d716d2da6fe2159540da3fab1fe5e6d66334bcb37f12abbc1\"" Oct 2 19:19:19.041666 env[1131]: time="2023-10-02T19:19:19.041616576Z" level=info msg="StartContainer for \"92ab9cab44ee9e0d716d2da6fe2159540da3fab1fe5e6d66334bcb37f12abbc1\"" Oct 2 19:19:19.077932 systemd[1]: Started cri-containerd-92ab9cab44ee9e0d716d2da6fe2159540da3fab1fe5e6d66334bcb37f12abbc1.scope. Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.100000 audit: BPF prog-id=126 op=LOAD Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000121c48 a2=10 a3=1c items=0 ppid=2204 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616239636162343465653965306437313664326461366665323135 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001216b0 a2=3c a3=8 items=0 ppid=2204 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616239636162343465653965306437313664326461366665323135 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit: BPF prog-id=127 op=LOAD Oct 2 19:19:19.101000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001219d8 a2=78 a3=c0003b0380 items=0 ppid=2204 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616239636162343465653965306437313664326461366665323135 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit: BPF prog-id=128 op=LOAD Oct 2 19:19:19.101000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000121770 a2=78 a3=c0003b03c8 items=0 ppid=2204 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616239636162343465653965306437313664326461366665323135 Oct 2 19:19:19.101000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:19:19.101000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { perfmon } for pid=2403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit[2403]: AVC avc: denied { bpf } for pid=2403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:19.101000 audit: BPF prog-id=129 op=LOAD Oct 2 19:19:19.101000 audit[2403]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000121c30 a2=78 a3=c0003b07d8 items=0 ppid=2204 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932616239636162343465653965306437313664326461366665323135 Oct 2 19:19:19.124823 env[1131]: time="2023-10-02T19:19:19.124744118Z" level=info msg="StartContainer for \"92ab9cab44ee9e0d716d2da6fe2159540da3fab1fe5e6d66334bcb37f12abbc1\" returns successfully" Oct 2 19:19:21.075213 kernel: kauditd_printk_skb: 375 callbacks suppressed Oct 2 19:19:21.075426 kernel: audit: type=1325 audit(1696274361.069:1037): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.069000 audit[2435]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.069000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcb8eca940 a2=0 a3=7ffcb8eca92c items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.125179 kernel: audit: type=1300 audit(1696274361.069:1037): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcb8eca940 a2=0 a3=7ffcb8eca92c items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.069000 audit[2435]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.157703 kernel: audit: type=1327 audit(1696274361.069:1037): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.157872 kernel: audit: type=1325 audit(1696274361.069:1038): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.157935 kernel: audit: type=1300 audit(1696274361.069:1038): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcb8eca940 a2=0 a3=31030 items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.069000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcb8eca940 a2=0 a3=31030 items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.207020 kernel: audit: type=1327 audit(1696274361.069:1038): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.214000 audit[2437]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.214000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffec12791d0 a2=0 a3=7ffec12791bc items=0 ppid=2249 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.266196 kernel: audit: type=1325 audit(1696274361.214:1039): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.266383 kernel: audit: type=1300 audit(1696274361.214:1039): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffec12791d0 a2=0 a3=7ffec12791bc items=0 ppid=2249 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.266436 kernel: audit: type=1327 audit(1696274361.214:1039): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.266000 audit[2437]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.299126 kernel: audit: type=1325 audit(1696274361.266:1040): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:21.266000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffec12791d0 a2=0 a3=31030 items=0 ppid=2249 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:21.328358 kubelet[2063]: I1002 19:19:21.328194 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-znxz2" podStartSLOduration=3.363952525 podCreationTimestamp="2023-10-02 19:19:16 +0000 UTC" firstStartedPulling="2023-10-02 19:19:17.045091812 +0000 UTC m=+13.303971854" lastFinishedPulling="2023-10-02 19:19:19.009246153 +0000 UTC m=+15.268126211" observedRunningTime="2023-10-02 19:19:20.109919619 +0000 UTC m=+16.368799683" watchObservedRunningTime="2023-10-02 19:19:21.328106882 +0000 UTC m=+17.586986981" Oct 2 19:19:21.329513 kubelet[2063]: I1002 19:19:21.329474 2063 topology_manager.go:215] "Topology Admit Handler" podUID="e3d88070-5edb-4981-b423-22be05102a01" podNamespace="calico-system" podName="calico-typha-599db7678f-4wjr4" Oct 2 19:19:21.342577 systemd[1]: Created slice kubepods-besteffort-pode3d88070_5edb_4981_b423_22be05102a01.slice. Oct 2 19:19:21.383664 kubelet[2063]: I1002 19:19:21.383621 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e3d88070-5edb-4981-b423-22be05102a01-tigera-ca-bundle\") pod \"calico-typha-599db7678f-4wjr4\" (UID: \"e3d88070-5edb-4981-b423-22be05102a01\") " pod="calico-system/calico-typha-599db7678f-4wjr4" Oct 2 19:19:21.383989 kubelet[2063]: I1002 19:19:21.383958 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e3d88070-5edb-4981-b423-22be05102a01-typha-certs\") pod \"calico-typha-599db7678f-4wjr4\" (UID: \"e3d88070-5edb-4981-b423-22be05102a01\") " pod="calico-system/calico-typha-599db7678f-4wjr4" Oct 2 19:19:21.384190 kubelet[2063]: I1002 19:19:21.384171 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qmml9\" (UniqueName: \"kubernetes.io/projected/e3d88070-5edb-4981-b423-22be05102a01-kube-api-access-qmml9\") pod \"calico-typha-599db7678f-4wjr4\" (UID: \"e3d88070-5edb-4981-b423-22be05102a01\") " pod="calico-system/calico-typha-599db7678f-4wjr4" Oct 2 19:19:21.413788 kubelet[2063]: I1002 19:19:21.413732 2063 topology_manager.go:215] "Topology Admit Handler" podUID="d7552630-0e71-4d57-a6c3-35a6a2eaa639" podNamespace="calico-system" podName="calico-node-6vf9w" Oct 2 19:19:21.422122 systemd[1]: Created slice kubepods-besteffort-podd7552630_0e71_4d57_a6c3_35a6a2eaa639.slice. Oct 2 19:19:21.431714 kubelet[2063]: W1002 19:19:21.431682 2063 reflector.go:535] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' and this object Oct 2 19:19:21.431944 kubelet[2063]: E1002 19:19:21.431927 2063 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' and this object Oct 2 19:19:21.432379 kubelet[2063]: W1002 19:19:21.432355 2063 reflector.go:535] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' and this object Oct 2 19:19:21.432549 kubelet[2063]: E1002 19:19:21.432530 2063 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' and this object Oct 2 19:19:21.485302 kubelet[2063]: I1002 19:19:21.485260 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-lib-modules\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.485587 kubelet[2063]: I1002 19:19:21.485567 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-flexvol-driver-host\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.485803 kubelet[2063]: I1002 19:19:21.485779 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-var-lib-calico\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.485956 kubelet[2063]: I1002 19:19:21.485941 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-cni-net-dir\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486096 kubelet[2063]: I1002 19:19:21.486079 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-policysync\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486247 kubelet[2063]: I1002 19:19:21.486232 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-cni-bin-dir\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486389 kubelet[2063]: I1002 19:19:21.486366 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-cni-log-dir\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486658 kubelet[2063]: I1002 19:19:21.486638 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fvn4j\" (UniqueName: \"kubernetes.io/projected/d7552630-0e71-4d57-a6c3-35a6a2eaa639-kube-api-access-fvn4j\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486811 kubelet[2063]: I1002 19:19:21.486795 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d7552630-0e71-4d57-a6c3-35a6a2eaa639-tigera-ca-bundle\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.486948 kubelet[2063]: I1002 19:19:21.486932 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d7552630-0e71-4d57-a6c3-35a6a2eaa639-node-certs\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.487112 kubelet[2063]: I1002 19:19:21.487096 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-var-run-calico\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.488041 kubelet[2063]: I1002 19:19:21.488016 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d7552630-0e71-4d57-a6c3-35a6a2eaa639-xtables-lock\") pod \"calico-node-6vf9w\" (UID: \"d7552630-0e71-4d57-a6c3-35a6a2eaa639\") " pod="calico-system/calico-node-6vf9w" Oct 2 19:19:21.592190 kubelet[2063]: E1002 19:19:21.592060 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.592190 kubelet[2063]: W1002 19:19:21.592093 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.592190 kubelet[2063]: E1002 19:19:21.592122 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:21.626503 kubelet[2063]: E1002 19:19:21.626472 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.626503 kubelet[2063]: W1002 19:19:21.626497 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.626741 kubelet[2063]: E1002 19:19:21.626536 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:21.649638 env[1131]: time="2023-10-02T19:19:21.649577765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599db7678f-4wjr4,Uid:e3d88070-5edb-4981-b423-22be05102a01,Namespace:calico-system,Attempt:0,}" Oct 2 19:19:21.688628 env[1131]: time="2023-10-02T19:19:21.688526097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:21.688846 env[1131]: time="2023-10-02T19:19:21.688655201Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:21.688846 env[1131]: time="2023-10-02T19:19:21.688694719Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:21.688990 env[1131]: time="2023-10-02T19:19:21.688941694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/22c0cb39d933d4cbaf899b2ed028180636092f73042b9b48f79f64c90b161447 pid=2450 runtime=io.containerd.runc.v2 Oct 2 19:19:21.696278 kubelet[2063]: E1002 19:19:21.695417 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.696278 kubelet[2063]: W1002 19:19:21.695440 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.696278 kubelet[2063]: E1002 19:19:21.695473 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:21.721604 systemd[1]: Started cri-containerd-22c0cb39d933d4cbaf899b2ed028180636092f73042b9b48f79f64c90b161447.scope. Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.758000 audit: BPF prog-id=130 op=LOAD Oct 2 19:19:21.759000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.759000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2450 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633063623339643933336434636261663839396232656430323831 Oct 2 19:19:21.759000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.759000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2450 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633063623339643933336434636261663839396232656430323831 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.760000 audit: BPF prog-id=131 op=LOAD Oct 2 19:19:21.760000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028ef00 items=0 ppid=2450 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633063623339643933336434636261663839396232656430323831 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.761000 audit: BPF prog-id=132 op=LOAD Oct 2 19:19:21.761000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028ef48 items=0 ppid=2450 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633063623339643933336434636261663839396232656430323831 Oct 2 19:19:21.762000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:19:21.763000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { perfmon } for pid=2462 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit[2462]: AVC avc: denied { bpf } for pid=2462 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:21.763000 audit: BPF prog-id=133 op=LOAD Oct 2 19:19:21.763000 audit[2462]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028f358 items=0 ppid=2450 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:21.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232633063623339643933336434636261663839396232656430323831 Oct 2 19:19:21.796487 kubelet[2063]: E1002 19:19:21.796375 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.796487 kubelet[2063]: W1002 19:19:21.796400 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.796487 kubelet[2063]: E1002 19:19:21.796429 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:21.821476 env[1131]: time="2023-10-02T19:19:21.821388855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-599db7678f-4wjr4,Uid:e3d88070-5edb-4981-b423-22be05102a01,Namespace:calico-system,Attempt:0,} returns sandbox id \"22c0cb39d933d4cbaf899b2ed028180636092f73042b9b48f79f64c90b161447\"" Oct 2 19:19:21.824005 env[1131]: time="2023-10-02T19:19:21.823961354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:19:21.897135 kubelet[2063]: E1002 19:19:21.897021 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.897135 kubelet[2063]: W1002 19:19:21.897053 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.897135 kubelet[2063]: E1002 19:19:21.897085 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:21.998268 kubelet[2063]: E1002 19:19:21.998235 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:21.998520 kubelet[2063]: W1002 19:19:21.998493 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:21.998654 kubelet[2063]: E1002 19:19:21.998635 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.100315 kubelet[2063]: E1002 19:19:22.100276 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.100540 kubelet[2063]: W1002 19:19:22.100314 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.100540 kubelet[2063]: E1002 19:19:22.100360 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.202042 kubelet[2063]: E1002 19:19:22.201906 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.202042 kubelet[2063]: W1002 19:19:22.201936 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.202042 kubelet[2063]: E1002 19:19:22.201966 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.294000 audit[2492]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:22.294000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc3a1227c0 a2=0 a3=7ffc3a1227ac items=0 ppid=2249 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:22.296000 audit[2492]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:22.296000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc3a1227c0 a2=0 a3=31030 items=0 ppid=2249 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:22.303433 kubelet[2063]: E1002 19:19:22.303399 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.303433 kubelet[2063]: W1002 19:19:22.303430 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.303614 kubelet[2063]: E1002 19:19:22.303460 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.404857 kubelet[2063]: E1002 19:19:22.404715 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.404857 kubelet[2063]: W1002 19:19:22.404741 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.404857 kubelet[2063]: E1002 19:19:22.404786 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.506524 kubelet[2063]: E1002 19:19:22.506382 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.506524 kubelet[2063]: W1002 19:19:22.506410 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.506524 kubelet[2063]: E1002 19:19:22.506438 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.592137 kubelet[2063]: E1002 19:19:22.592082 2063 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 19:19:22.592388 kubelet[2063]: E1002 19:19:22.592240 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d7552630-0e71-4d57-a6c3-35a6a2eaa639-node-certs podName:d7552630-0e71-4d57-a6c3-35a6a2eaa639 nodeName:}" failed. No retries permitted until 2023-10-02 19:19:23.092199572 +0000 UTC m=+19.351079636 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/d7552630-0e71-4d57-a6c3-35a6a2eaa639-node-certs") pod "calico-node-6vf9w" (UID: "d7552630-0e71-4d57-a6c3-35a6a2eaa639") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:19:22.607628 kubelet[2063]: E1002 19:19:22.607592 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.607628 kubelet[2063]: W1002 19:19:22.607618 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.607861 kubelet[2063]: E1002 19:19:22.607647 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.708563 kubelet[2063]: E1002 19:19:22.708435 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.708563 kubelet[2063]: W1002 19:19:22.708463 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.708563 kubelet[2063]: E1002 19:19:22.708492 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.810204 kubelet[2063]: E1002 19:19:22.809948 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.810204 kubelet[2063]: W1002 19:19:22.809974 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.810204 kubelet[2063]: E1002 19:19:22.810002 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:22.865577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2962791317.mount: Deactivated successfully. Oct 2 19:19:22.911681 kubelet[2063]: E1002 19:19:22.911638 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:22.911681 kubelet[2063]: W1002 19:19:22.911682 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:22.911953 kubelet[2063]: E1002 19:19:22.911712 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.012590 kubelet[2063]: E1002 19:19:23.012548 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.012590 kubelet[2063]: W1002 19:19:23.012581 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.012989 kubelet[2063]: E1002 19:19:23.012617 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.114384 kubelet[2063]: E1002 19:19:23.114342 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.114384 kubelet[2063]: W1002 19:19:23.114372 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.114804 kubelet[2063]: E1002 19:19:23.114405 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.114877 kubelet[2063]: E1002 19:19:23.114812 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.114877 kubelet[2063]: W1002 19:19:23.114826 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.114877 kubelet[2063]: E1002 19:19:23.114848 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.115359 kubelet[2063]: E1002 19:19:23.115332 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.115359 kubelet[2063]: W1002 19:19:23.115352 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.115861 kubelet[2063]: E1002 19:19:23.115375 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.115861 kubelet[2063]: E1002 19:19:23.115714 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.115861 kubelet[2063]: W1002 19:19:23.115729 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.115861 kubelet[2063]: E1002 19:19:23.115776 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.116124 kubelet[2063]: E1002 19:19:23.116101 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.116124 kubelet[2063]: W1002 19:19:23.116120 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.116283 kubelet[2063]: E1002 19:19:23.116140 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.127385 kubelet[2063]: E1002 19:19:23.125900 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:23.127385 kubelet[2063]: W1002 19:19:23.125922 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:23.127385 kubelet[2063]: E1002 19:19:23.125948 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:23.229776 env[1131]: time="2023-10-02T19:19:23.229697402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vf9w,Uid:d7552630-0e71-4d57-a6c3-35a6a2eaa639,Namespace:calico-system,Attempt:0,}" Oct 2 19:19:23.290584 env[1131]: time="2023-10-02T19:19:23.290233755Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:23.290584 env[1131]: time="2023-10-02T19:19:23.290289177Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:23.290584 env[1131]: time="2023-10-02T19:19:23.290334360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:23.291732 env[1131]: time="2023-10-02T19:19:23.291649610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5 pid=2515 runtime=io.containerd.runc.v2 Oct 2 19:19:23.333908 systemd[1]: Started cri-containerd-ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5.scope. Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.373000 audit: BPF prog-id=134 op=LOAD Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2515 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353234303562323061376464393335343537303263613536623864 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2515 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353234303562323061376464393335343537303263613536623864 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit: BPF prog-id=135 op=LOAD Oct 2 19:19:23.375000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000204b90 items=0 ppid=2515 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353234303562323061376464393335343537303263613536623864 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit: BPF prog-id=136 op=LOAD Oct 2 19:19:23.375000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000204bd8 items=0 ppid=2515 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353234303562323061376464393335343537303263613536623864 Oct 2 19:19:23.375000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:19:23.375000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.375000 audit: BPF prog-id=137 op=LOAD Oct 2 19:19:23.375000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000204fe8 items=0 ppid=2515 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353234303562323061376464393335343537303263613536623864 Oct 2 19:19:23.409678 env[1131]: time="2023-10-02T19:19:23.409611121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6vf9w,Uid:d7552630-0e71-4d57-a6c3-35a6a2eaa639,Namespace:calico-system,Attempt:0,} returns sandbox id \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\"" Oct 2 19:19:24.359446 env[1131]: time="2023-10-02T19:19:24.359375761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:24.362806 env[1131]: time="2023-10-02T19:19:24.362752983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:24.365511 env[1131]: time="2023-10-02T19:19:24.365454163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:24.368904 env[1131]: time="2023-10-02T19:19:24.368852656Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:24.370312 env[1131]: time="2023-10-02T19:19:24.370212895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:19:24.374222 env[1131]: time="2023-10-02T19:19:24.372126636Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:19:24.374671 env[1131]: time="2023-10-02T19:19:24.374213239Z" level=info msg="CreateContainer within sandbox \"22c0cb39d933d4cbaf899b2ed028180636092f73042b9b48f79f64c90b161447\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:19:24.394053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4251611735.mount: Deactivated successfully. Oct 2 19:19:24.411023 env[1131]: time="2023-10-02T19:19:24.410939695Z" level=info msg="CreateContainer within sandbox \"22c0cb39d933d4cbaf899b2ed028180636092f73042b9b48f79f64c90b161447\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e374dedea1defb162d04105af95a1f468cdd09483ba69ad9b8497d56539dde10\"" Oct 2 19:19:24.414111 env[1131]: time="2023-10-02T19:19:24.413975646Z" level=info msg="StartContainer for \"e374dedea1defb162d04105af95a1f468cdd09483ba69ad9b8497d56539dde10\"" Oct 2 19:19:24.449426 systemd[1]: Started cri-containerd-e374dedea1defb162d04105af95a1f468cdd09483ba69ad9b8497d56539dde10.scope. Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.473000 audit: BPF prog-id=138 op=LOAD Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2450 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373464656465613164656662313632643034313035616639356131 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2450 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373464656465613164656662313632643034313035616639356131 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit: BPF prog-id=139 op=LOAD Oct 2 19:19:24.474000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000330b90 items=0 ppid=2450 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373464656465613164656662313632643034313035616639356131 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit: BPF prog-id=140 op=LOAD Oct 2 19:19:24.474000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000330bd8 items=0 ppid=2450 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373464656465613164656662313632643034313035616639356131 Oct 2 19:19:24.474000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:19:24.474000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { perfmon } for pid=2556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit[2556]: AVC avc: denied { bpf } for pid=2556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.474000 audit: BPF prog-id=141 op=LOAD Oct 2 19:19:24.474000 audit[2556]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000330fe8 items=0 ppid=2450 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373464656465613164656662313632643034313035616639356131 Oct 2 19:19:24.509365 env[1131]: time="2023-10-02T19:19:24.509306618Z" level=info msg="StartContainer for \"e374dedea1defb162d04105af95a1f468cdd09483ba69ad9b8497d56539dde10\" returns successfully" Oct 2 19:19:25.163937 kubelet[2063]: I1002 19:19:25.163896 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-599db7678f-4wjr4" podStartSLOduration=1.615666868 podCreationTimestamp="2023-10-02 19:19:21 +0000 UTC" firstStartedPulling="2023-10-02 19:19:21.823313766 +0000 UTC m=+18.082193827" lastFinishedPulling="2023-10-02 19:19:24.371469925 +0000 UTC m=+20.630349970" observedRunningTime="2023-10-02 19:19:25.153355729 +0000 UTC m=+21.412235795" watchObservedRunningTime="2023-10-02 19:19:25.163823011 +0000 UTC m=+21.422703087" Oct 2 19:19:25.181595 kubelet[2063]: E1002 19:19:25.181556 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.181818 kubelet[2063]: W1002 19:19:25.181606 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.181818 kubelet[2063]: E1002 19:19:25.181641 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.182046 kubelet[2063]: E1002 19:19:25.182025 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.182132 kubelet[2063]: W1002 19:19:25.182046 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.182132 kubelet[2063]: E1002 19:19:25.182069 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.182450 kubelet[2063]: E1002 19:19:25.182421 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.182542 kubelet[2063]: W1002 19:19:25.182452 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.182542 kubelet[2063]: E1002 19:19:25.182473 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.182811 kubelet[2063]: E1002 19:19:25.182789 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.182811 kubelet[2063]: W1002 19:19:25.182809 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.182951 kubelet[2063]: E1002 19:19:25.182829 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.183199 kubelet[2063]: E1002 19:19:25.183171 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.183199 kubelet[2063]: W1002 19:19:25.183196 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.183344 kubelet[2063]: E1002 19:19:25.183226 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.183966 kubelet[2063]: E1002 19:19:25.183931 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.183966 kubelet[2063]: W1002 19:19:25.183961 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.184172 kubelet[2063]: E1002 19:19:25.183982 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.184917 kubelet[2063]: E1002 19:19:25.184892 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.184917 kubelet[2063]: W1002 19:19:25.184913 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.185071 kubelet[2063]: E1002 19:19:25.184949 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.185565 kubelet[2063]: E1002 19:19:25.185541 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.185565 kubelet[2063]: W1002 19:19:25.185562 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.185745 kubelet[2063]: E1002 19:19:25.185582 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.185969 kubelet[2063]: E1002 19:19:25.185946 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.185969 kubelet[2063]: W1002 19:19:25.185966 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.186101 kubelet[2063]: E1002 19:19:25.185986 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.186330 kubelet[2063]: E1002 19:19:25.186305 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.186330 kubelet[2063]: W1002 19:19:25.186327 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.186489 kubelet[2063]: E1002 19:19:25.186347 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.186653 kubelet[2063]: E1002 19:19:25.186631 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.186653 kubelet[2063]: W1002 19:19:25.186651 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.186803 kubelet[2063]: E1002 19:19:25.186671 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.186973 kubelet[2063]: E1002 19:19:25.186951 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.187102 kubelet[2063]: W1002 19:19:25.186974 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.187102 kubelet[2063]: E1002 19:19:25.186993 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.188360 kubelet[2063]: E1002 19:19:25.188335 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.188360 kubelet[2063]: W1002 19:19:25.188358 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.188532 kubelet[2063]: E1002 19:19:25.188378 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.188818 kubelet[2063]: E1002 19:19:25.188794 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.188969 kubelet[2063]: W1002 19:19:25.188838 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.188969 kubelet[2063]: E1002 19:19:25.188861 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.190436 kubelet[2063]: E1002 19:19:25.190330 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.190436 kubelet[2063]: W1002 19:19:25.190348 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.190436 kubelet[2063]: E1002 19:19:25.190368 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.197000 audit[2602]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:25.197000 audit[2602]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffe8f2d7b0 a2=0 a3=7fffe8f2d79c items=0 ppid=2249 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:25.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:25.198000 audit[2602]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2602 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:25.198000 audit[2602]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fffe8f2d7b0 a2=0 a3=7fffe8f2d79c items=0 ppid=2249 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:25.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:25.234887 kubelet[2063]: E1002 19:19:25.234838 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.234887 kubelet[2063]: W1002 19:19:25.234865 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.234887 kubelet[2063]: E1002 19:19:25.234894 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.235795 kubelet[2063]: E1002 19:19:25.235768 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.235795 kubelet[2063]: W1002 19:19:25.235791 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.235969 kubelet[2063]: E1002 19:19:25.235821 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.236274 kubelet[2063]: E1002 19:19:25.236251 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.236367 kubelet[2063]: W1002 19:19:25.236272 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.236367 kubelet[2063]: E1002 19:19:25.236304 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.236650 kubelet[2063]: E1002 19:19:25.236629 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.236650 kubelet[2063]: W1002 19:19:25.236649 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.236787 kubelet[2063]: E1002 19:19:25.236674 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.237094 kubelet[2063]: E1002 19:19:25.237072 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.237094 kubelet[2063]: W1002 19:19:25.237093 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.237291 kubelet[2063]: E1002 19:19:25.237263 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.237483 kubelet[2063]: E1002 19:19:25.237461 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.237483 kubelet[2063]: W1002 19:19:25.237482 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.237666 kubelet[2063]: E1002 19:19:25.237603 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.237829 kubelet[2063]: E1002 19:19:25.237810 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.237829 kubelet[2063]: W1002 19:19:25.237829 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.238006 kubelet[2063]: E1002 19:19:25.237986 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.238243 kubelet[2063]: E1002 19:19:25.238223 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.238243 kubelet[2063]: W1002 19:19:25.238242 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.238374 kubelet[2063]: E1002 19:19:25.238267 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.238612 kubelet[2063]: E1002 19:19:25.238592 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.238612 kubelet[2063]: W1002 19:19:25.238612 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.238771 kubelet[2063]: E1002 19:19:25.238635 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.239419 kubelet[2063]: E1002 19:19:25.239392 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.239419 kubelet[2063]: W1002 19:19:25.239412 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.239601 kubelet[2063]: E1002 19:19:25.239534 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.239778 kubelet[2063]: E1002 19:19:25.239760 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.239916 kubelet[2063]: W1002 19:19:25.239877 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.240078 kubelet[2063]: E1002 19:19:25.240040 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.240303 kubelet[2063]: E1002 19:19:25.240284 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.240303 kubelet[2063]: W1002 19:19:25.240300 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.240432 kubelet[2063]: E1002 19:19:25.240325 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.240916 kubelet[2063]: E1002 19:19:25.240722 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.240916 kubelet[2063]: W1002 19:19:25.240739 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.240916 kubelet[2063]: E1002 19:19:25.240766 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.241272 kubelet[2063]: E1002 19:19:25.241251 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.241272 kubelet[2063]: W1002 19:19:25.241271 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.241397 kubelet[2063]: E1002 19:19:25.241297 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.241895 kubelet[2063]: E1002 19:19:25.241875 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.241895 kubelet[2063]: W1002 19:19:25.241892 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.242097 kubelet[2063]: E1002 19:19:25.242026 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.242297 kubelet[2063]: E1002 19:19:25.242279 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.242446 kubelet[2063]: W1002 19:19:25.242406 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.242446 kubelet[2063]: E1002 19:19:25.242434 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.242828 kubelet[2063]: E1002 19:19:25.242801 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.242828 kubelet[2063]: W1002 19:19:25.242820 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.242996 kubelet[2063]: E1002 19:19:25.242841 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:25.243412 kubelet[2063]: E1002 19:19:25.243387 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:25.243512 kubelet[2063]: W1002 19:19:25.243414 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:25.243512 kubelet[2063]: E1002 19:19:25.243434 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.067829 env[1131]: time="2023-10-02T19:19:26.067761829Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.071179 env[1131]: time="2023-10-02T19:19:26.071106935Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.076555 env[1131]: time="2023-10-02T19:19:26.076508048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.081510 env[1131]: time="2023-10-02T19:19:26.081464153Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:26.083437 env[1131]: time="2023-10-02T19:19:26.083383424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:19:26.087464 env[1131]: time="2023-10-02T19:19:26.087423495Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:19:26.115502 env[1131]: time="2023-10-02T19:19:26.115440279Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5\"" Oct 2 19:19:26.116641 env[1131]: time="2023-10-02T19:19:26.116594862Z" level=info msg="StartContainer for \"2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5\"" Oct 2 19:19:26.164909 systemd[1]: Started cri-containerd-2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5.scope. Oct 2 19:19:26.197550 kubelet[2063]: E1002 19:19:26.197510 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.197550 kubelet[2063]: W1002 19:19:26.197543 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.198216 kubelet[2063]: E1002 19:19:26.197591 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.198216 kubelet[2063]: E1002 19:19:26.198014 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.198216 kubelet[2063]: W1002 19:19:26.198027 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.198216 kubelet[2063]: E1002 19:19:26.198048 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.198461 kubelet[2063]: E1002 19:19:26.198392 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.198461 kubelet[2063]: W1002 19:19:26.198405 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.198461 kubelet[2063]: E1002 19:19:26.198436 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.198792 kubelet[2063]: E1002 19:19:26.198745 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.198792 kubelet[2063]: W1002 19:19:26.198764 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.198792 kubelet[2063]: E1002 19:19:26.198784 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.199121 kubelet[2063]: E1002 19:19:26.199104 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.199121 kubelet[2063]: W1002 19:19:26.199119 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.199301 kubelet[2063]: E1002 19:19:26.199177 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.200299 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.201541 kubelet[2063]: W1002 19:19:26.200318 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.200340 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.200664 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.201541 kubelet[2063]: W1002 19:19:26.200679 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.200698 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.201005 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.201541 kubelet[2063]: W1002 19:19:26.201018 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.201037 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.201541 kubelet[2063]: E1002 19:19:26.201376 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.202095 kubelet[2063]: W1002 19:19:26.201389 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.202095 kubelet[2063]: E1002 19:19:26.201408 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202258 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204186 kubelet[2063]: W1002 19:19:26.202283 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202305 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202618 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204186 kubelet[2063]: W1002 19:19:26.202630 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202649 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202935 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204186 kubelet[2063]: W1002 19:19:26.202945 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.202966 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204186 kubelet[2063]: E1002 19:19:26.203310 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204696 kubelet[2063]: W1002 19:19:26.203323 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204696 kubelet[2063]: E1002 19:19:26.203342 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204696 kubelet[2063]: E1002 19:19:26.203633 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204696 kubelet[2063]: W1002 19:19:26.203644 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204696 kubelet[2063]: E1002 19:19:26.203661 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.204696 kubelet[2063]: E1002 19:19:26.203943 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.204696 kubelet[2063]: W1002 19:19:26.203955 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.204696 kubelet[2063]: E1002 19:19:26.203971 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.215019 kernel: kauditd_printk_skb: 185 callbacks suppressed Oct 2 19:19:26.215213 kernel: audit: type=1400 audit(1696274366.207:1099): avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.236397 kernel: audit: type=1300 audit(1696274366.207:1099): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.269041 kubelet[2063]: E1002 19:19:26.269008 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.269288 kubelet[2063]: W1002 19:19:26.269260 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.269437 kubelet[2063]: E1002 19:19:26.269419 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.270056 kubelet[2063]: E1002 19:19:26.270031 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.270238 kubelet[2063]: W1002 19:19:26.270215 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.270371 kubelet[2063]: E1002 19:19:26.270355 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.271050 kubelet[2063]: E1002 19:19:26.271025 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.271291 kubelet[2063]: W1002 19:19:26.271265 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.271424 kubelet[2063]: E1002 19:19:26.271406 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.271910 kubelet[2063]: E1002 19:19:26.271889 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.272050 kubelet[2063]: W1002 19:19:26.272032 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.272330 kubelet[2063]: E1002 19:19:26.272310 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.272558 kubelet[2063]: E1002 19:19:26.272539 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.272558 kubelet[2063]: W1002 19:19:26.272557 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.272744 kubelet[2063]: E1002 19:19:26.272582 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.272921 kubelet[2063]: E1002 19:19:26.272886 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.272921 kubelet[2063]: W1002 19:19:26.272902 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.273046 kubelet[2063]: E1002 19:19:26.273017 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.273352 kubelet[2063]: E1002 19:19:26.273328 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.273352 kubelet[2063]: W1002 19:19:26.273346 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.273488 kubelet[2063]: E1002 19:19:26.273460 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.273829 kubelet[2063]: E1002 19:19:26.273724 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.273829 kubelet[2063]: W1002 19:19:26.273815 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.274027 kubelet[2063]: E1002 19:19:26.273867 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.274956 kubelet[2063]: E1002 19:19:26.274913 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.274956 kubelet[2063]: W1002 19:19:26.274941 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.275127 kubelet[2063]: E1002 19:19:26.275076 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.275457 kubelet[2063]: E1002 19:19:26.275420 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.275457 kubelet[2063]: W1002 19:19:26.275442 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.276131 kubelet[2063]: E1002 19:19:26.276075 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.277301 kubelet[2063]: E1002 19:19:26.277274 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.277301 kubelet[2063]: W1002 19:19:26.277299 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343362373634333237303263653463653737316431313034326162 Oct 2 19:19:26.303747 kubelet[2063]: E1002 19:19:26.293851 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.303747 kubelet[2063]: E1002 19:19:26.293989 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.303747 kubelet[2063]: W1002 19:19:26.294003 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.303747 kubelet[2063]: E1002 19:19:26.294310 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.304918 kubelet[2063]: E1002 19:19:26.304889 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.305060 kubelet[2063]: W1002 19:19:26.305040 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.305336 kubelet[2063]: E1002 19:19:26.305319 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.308245 kernel: audit: type=1327 audit(1696274366.207:1099): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343362373634333237303263653463653737316431313034326162 Oct 2 19:19:26.308380 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.308722 kubelet[2063]: E1002 19:19:26.308704 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.308874 kubelet[2063]: W1002 19:19:26.308855 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.309182 kubelet[2063]: E1002 19:19:26.309145 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.309689 kubelet[2063]: E1002 19:19:26.309673 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.309842 kubelet[2063]: W1002 19:19:26.309824 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.310104 kubelet[2063]: E1002 19:19:26.310081 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.310498 kubelet[2063]: E1002 19:19:26.310484 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.310639 kubelet[2063]: W1002 19:19:26.310621 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.310858 kubelet[2063]: E1002 19:19:26.310844 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.311308 kubelet[2063]: E1002 19:19:26.311293 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.311462 kubelet[2063]: W1002 19:19:26.311444 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.311602 kubelet[2063]: E1002 19:19:26.311586 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.312404 kubelet[2063]: E1002 19:19:26.312387 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:19:26.312564 kubelet[2063]: W1002 19:19:26.312547 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:19:26.312707 kubelet[2063]: E1002 19:19:26.312692 2063 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.360234 systemd[1]: cri-containerd-2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5.scope: Deactivated successfully. Oct 2 19:19:26.372093 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.372222 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.394794 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.409464 env[1131]: time="2023-10-02T19:19:26.399345479Z" level=info msg="StartContainer for \"2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5\" returns successfully" Oct 2 19:19:26.416246 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.442405 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.464323 kernel: audit: type=1400 audit(1696274366.207:1100): avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit: BPF prog-id=142 op=LOAD Oct 2 19:19:26.207000 audit[2628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003304c0 items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343362373634333237303263653463653737316431313034326162 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit: BPF prog-id=143 op=LOAD Oct 2 19:19:26.207000 audit[2628]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000330508 items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343362373634333237303263653463653737316431313034326162 Oct 2 19:19:26.207000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:19:26.207000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { perfmon } for pid=2628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit[2628]: AVC avc: denied { bpf } for pid=2628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:26.207000 audit: BPF prog-id=144 op=LOAD Oct 2 19:19:26.207000 audit[2628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000330598 items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343362373634333237303263653463653737316431313034326162 Oct 2 19:19:26.393000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:19:26.468923 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5-rootfs.mount: Deactivated successfully. Oct 2 19:19:27.031777 env[1131]: time="2023-10-02T19:19:27.031691657Z" level=info msg="shim disconnected" id=2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5 Oct 2 19:19:27.031777 env[1131]: time="2023-10-02T19:19:27.031755111Z" level=warning msg="cleaning up after shim disconnected" id=2343b76432702ce4ce771d11042abe9630d71a513f016ed41505cba133cfb9b5 namespace=k8s.io Oct 2 19:19:27.031777 env[1131]: time="2023-10-02T19:19:27.031772061Z" level=info msg="cleaning up dead shim" Oct 2 19:19:27.045121 env[1131]: time="2023-10-02T19:19:27.045049888Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2699 runtime=io.containerd.runc.v2\n" Oct 2 19:19:27.159215 env[1131]: time="2023-10-02T19:19:27.156389216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:19:27.995551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2508384326.mount: Deactivated successfully. Oct 2 19:19:31.566576 env[1131]: time="2023-10-02T19:19:31.566494528Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.570354 env[1131]: time="2023-10-02T19:19:31.570300654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.572940 env[1131]: time="2023-10-02T19:19:31.572891570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.575549 env[1131]: time="2023-10-02T19:19:31.575505158Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.576558 env[1131]: time="2023-10-02T19:19:31.576504365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:19:31.581172 env[1131]: time="2023-10-02T19:19:31.580972815Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:19:31.604401 env[1131]: time="2023-10-02T19:19:31.604335132Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94\"" Oct 2 19:19:31.605542 env[1131]: time="2023-10-02T19:19:31.605505125Z" level=info msg="StartContainer for \"854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94\"" Oct 2 19:19:31.644112 systemd[1]: Started cri-containerd-854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94.scope. Oct 2 19:19:31.655573 systemd[1]: run-containerd-runc-k8s.io-854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94-runc.Lp6IIZ.mount: Deactivated successfully. Oct 2 19:19:31.721510 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:19:31.721702 kernel: audit: type=1400 audit(1696274371.692:1106): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2515 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.754338 kernel: audit: type=1300 audit(1696274371.692:1106): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2515 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.786681 kernel: audit: type=1327 audit(1696274371.692:1106): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835343538323538346562613434313837326130343538613562366133 Oct 2 19:19:31.786843 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835343538323538346562613434313837326130343538613562366133 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.855010 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.855428 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.855496 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.899057 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.900072 env[1131]: time="2023-10-02T19:19:31.900017684Z" level=info msg="StartContainer for \"854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94\" returns successfully" Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.941930 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.942109 kernel: audit: type=1400 audit(1696274371.692:1107): avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.692000 audit: BPF prog-id=145 op=LOAD Oct 2 19:19:31.692000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000399360 items=0 ppid=2515 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835343538323538346562613434313837326130343538613562366133 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit: BPF prog-id=146 op=LOAD Oct 2 19:19:31.720000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003993a8 items=0 ppid=2515 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835343538323538346562613434313837326130343538613562366133 Oct 2 19:19:31.720000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:19:31.720000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { perfmon } for pid=2726 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit[2726]: AVC avc: denied { bpf } for pid=2726 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:31.720000 audit: BPF prog-id=147 op=LOAD Oct 2 19:19:31.720000 audit[2726]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000399438 items=0 ppid=2515 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835343538323538346562613434313837326130343538613562366133 Oct 2 19:19:32.734418 env[1131]: time="2023-10-02T19:19:32.734336948Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:19:32.745571 systemd[1]: cri-containerd-854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94.scope: Deactivated successfully. Oct 2 19:19:32.747000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:19:32.773493 kubelet[2063]: I1002 19:19:32.773443 2063 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:19:32.793099 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94-rootfs.mount: Deactivated successfully. Oct 2 19:19:32.824508 kubelet[2063]: I1002 19:19:32.824457 2063 topology_manager.go:215] "Topology Admit Handler" podUID="19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5" podNamespace="kube-system" podName="coredns-5dd5756b68-q27g4" Oct 2 19:19:32.832222 kubelet[2063]: I1002 19:19:32.831712 2063 topology_manager.go:215] "Topology Admit Handler" podUID="18cf6ee5-1e90-4777-98f0-74942dcf3521" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-t7dgc" Oct 2 19:19:32.832447 kubelet[2063]: I1002 19:19:32.832378 2063 topology_manager.go:215] "Topology Admit Handler" podUID="15d82d10-716e-4228-a123-68bf708ecb9c" podNamespace="kube-system" podName="coredns-5dd5756b68-mv9wl" Oct 2 19:19:32.833645 kubelet[2063]: I1002 19:19:32.833123 2063 topology_manager.go:215] "Topology Admit Handler" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" podNamespace="calico-system" podName="csi-node-driver-htm56" Oct 2 19:19:32.838073 systemd[1]: Created slice kubepods-burstable-pod19e4ffc4_3245_4f79_91b7_ac0a6ad7ead5.slice. Oct 2 19:19:32.853392 systemd[1]: Created slice kubepods-besteffort-pod18cf6ee5_1e90_4777_98f0_74942dcf3521.slice. Oct 2 19:19:32.868111 systemd[1]: Created slice kubepods-burstable-pod15d82d10_716e_4228_a123_68bf708ecb9c.slice. Oct 2 19:19:32.873356 systemd[1]: Created slice kubepods-besteffort-pod337ce5b7_3c06_46ae_9ef6_1f5cfa4479b8.slice. Oct 2 19:19:32.929636 kubelet[2063]: I1002 19:19:32.929591 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-varrun\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.929999 kubelet[2063]: I1002 19:19:32.929979 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-registration-dir\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.930294 kubelet[2063]: I1002 19:19:32.930233 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/15d82d10-716e-4228-a123-68bf708ecb9c-config-volume\") pod \"coredns-5dd5756b68-mv9wl\" (UID: \"15d82d10-716e-4228-a123-68bf708ecb9c\") " pod="kube-system/coredns-5dd5756b68-mv9wl" Oct 2 19:19:32.930294 kubelet[2063]: I1002 19:19:32.930279 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5-config-volume\") pod \"coredns-5dd5756b68-q27g4\" (UID: \"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5\") " pod="kube-system/coredns-5dd5756b68-q27g4" Oct 2 19:19:32.930483 kubelet[2063]: I1002 19:19:32.930324 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fh8c2\" (UniqueName: \"kubernetes.io/projected/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-kube-api-access-fh8c2\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.930483 kubelet[2063]: I1002 19:19:32.930357 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-etccalico\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.930483 kubelet[2063]: I1002 19:19:32.930398 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tp9tt\" (UniqueName: \"kubernetes.io/projected/18cf6ee5-1e90-4777-98f0-74942dcf3521-kube-api-access-tp9tt\") pod \"calico-kube-controllers-74b9887bb6-t7dgc\" (UID: \"18cf6ee5-1e90-4777-98f0-74942dcf3521\") " pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" Oct 2 19:19:32.930483 kubelet[2063]: I1002 19:19:32.930441 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x2jst\" (UniqueName: \"kubernetes.io/projected/19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5-kube-api-access-x2jst\") pod \"coredns-5dd5756b68-q27g4\" (UID: \"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5\") " pod="kube-system/coredns-5dd5756b68-q27g4" Oct 2 19:19:32.930483 kubelet[2063]: I1002 19:19:32.930477 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-kubelet-dir\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.930758 kubelet[2063]: I1002 19:19:32.930514 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8-socket-dir\") pod \"csi-node-driver-htm56\" (UID: \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\") " pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:32.930758 kubelet[2063]: I1002 19:19:32.930553 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l4fzt\" (UniqueName: \"kubernetes.io/projected/15d82d10-716e-4228-a123-68bf708ecb9c-kube-api-access-l4fzt\") pod \"coredns-5dd5756b68-mv9wl\" (UID: \"15d82d10-716e-4228-a123-68bf708ecb9c\") " pod="kube-system/coredns-5dd5756b68-mv9wl" Oct 2 19:19:33.147342 env[1131]: time="2023-10-02T19:19:33.147260483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-q27g4,Uid:19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:33.165262 env[1131]: time="2023-10-02T19:19:33.165178530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-t7dgc,Uid:18cf6ee5-1e90-4777-98f0-74942dcf3521,Namespace:calico-system,Attempt:0,}" Oct 2 19:19:33.174295 env[1131]: time="2023-10-02T19:19:33.174234702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mv9wl,Uid:15d82d10-716e-4228-a123-68bf708ecb9c,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:33.183168 env[1131]: time="2023-10-02T19:19:33.182604098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-htm56,Uid:337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8,Namespace:calico-system,Attempt:0,}" Oct 2 19:19:33.516709 env[1131]: time="2023-10-02T19:19:33.516270804Z" level=info msg="shim disconnected" id=854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94 Oct 2 19:19:33.516709 env[1131]: time="2023-10-02T19:19:33.516334256Z" level=warning msg="cleaning up after shim disconnected" id=854582584eba441872a0458a5b6a3b8d159415ba52011315207c1cfe4b75dc94 namespace=k8s.io Oct 2 19:19:33.516709 env[1131]: time="2023-10-02T19:19:33.516350185Z" level=info msg="cleaning up dead shim" Oct 2 19:19:33.534187 env[1131]: time="2023-10-02T19:19:33.534039100Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2776 runtime=io.containerd.runc.v2\n" Oct 2 19:19:33.758209 env[1131]: time="2023-10-02T19:19:33.758103460Z" level=error msg="Failed to destroy network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.758854 env[1131]: time="2023-10-02T19:19:33.758616086Z" level=error msg="encountered an error cleaning up failed sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.758854 env[1131]: time="2023-10-02T19:19:33.758703424Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-t7dgc,Uid:18cf6ee5-1e90-4777-98f0-74942dcf3521,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.762469 kubelet[2063]: E1002 19:19:33.759371 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.762469 kubelet[2063]: E1002 19:19:33.759487 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" Oct 2 19:19:33.762469 kubelet[2063]: E1002 19:19:33.759543 2063 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" Oct 2 19:19:33.762997 kubelet[2063]: E1002 19:19:33.759650 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-t7dgc_calico-system(18cf6ee5-1e90-4777-98f0-74942dcf3521)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-t7dgc_calico-system(18cf6ee5-1e90-4777-98f0-74942dcf3521)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" podUID="18cf6ee5-1e90-4777-98f0-74942dcf3521" Oct 2 19:19:33.766242 env[1131]: time="2023-10-02T19:19:33.766128708Z" level=error msg="Failed to destroy network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.767017 env[1131]: time="2023-10-02T19:19:33.766855659Z" level=error msg="encountered an error cleaning up failed sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.767476 env[1131]: time="2023-10-02T19:19:33.767401775Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mv9wl,Uid:15d82d10-716e-4228-a123-68bf708ecb9c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.770786 kubelet[2063]: E1002 19:19:33.768067 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.770786 kubelet[2063]: E1002 19:19:33.768181 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mv9wl" Oct 2 19:19:33.770786 kubelet[2063]: E1002 19:19:33.768236 2063 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mv9wl" Oct 2 19:19:33.771963 kubelet[2063]: E1002 19:19:33.768327 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-mv9wl_kube-system(15d82d10-716e-4228-a123-68bf708ecb9c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-mv9wl_kube-system(15d82d10-716e-4228-a123-68bf708ecb9c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mv9wl" podUID="15d82d10-716e-4228-a123-68bf708ecb9c" Oct 2 19:19:33.774389 env[1131]: time="2023-10-02T19:19:33.774307104Z" level=error msg="Failed to destroy network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.774832 env[1131]: time="2023-10-02T19:19:33.774777502Z" level=error msg="encountered an error cleaning up failed sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.774950 env[1131]: time="2023-10-02T19:19:33.774857684Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-q27g4,Uid:19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.778262 kubelet[2063]: E1002 19:19:33.775273 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.778262 kubelet[2063]: E1002 19:19:33.775365 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-q27g4" Oct 2 19:19:33.778262 kubelet[2063]: E1002 19:19:33.775398 2063 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-q27g4" Oct 2 19:19:33.779514 kubelet[2063]: E1002 19:19:33.775538 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-q27g4_kube-system(19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-q27g4_kube-system(19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-q27g4" podUID="19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5" Oct 2 19:19:33.802086 env[1131]: time="2023-10-02T19:19:33.802015674Z" level=error msg="Failed to destroy network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.803631 env[1131]: time="2023-10-02T19:19:33.803565924Z" level=error msg="encountered an error cleaning up failed sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.803894 env[1131]: time="2023-10-02T19:19:33.803837875Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-htm56,Uid:337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.807610 kubelet[2063]: E1002 19:19:33.804433 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:33.807610 kubelet[2063]: E1002 19:19:33.804519 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:33.807610 kubelet[2063]: E1002 19:19:33.804581 2063 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-htm56" Oct 2 19:19:33.808630 kubelet[2063]: E1002 19:19:33.807561 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:19:33.807641 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286-shm.mount: Deactivated successfully. Oct 2 19:19:34.171659 kubelet[2063]: I1002 19:19:34.171567 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:34.173967 env[1131]: time="2023-10-02T19:19:34.173046145Z" level=info msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" Oct 2 19:19:34.175379 kubelet[2063]: I1002 19:19:34.174669 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:34.175744 env[1131]: time="2023-10-02T19:19:34.175694762Z" level=info msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" Oct 2 19:19:34.181096 kubelet[2063]: I1002 19:19:34.180258 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:34.181921 env[1131]: time="2023-10-02T19:19:34.180955485Z" level=info msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" Oct 2 19:19:34.190196 env[1131]: time="2023-10-02T19:19:34.188592361Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:19:34.194199 kubelet[2063]: I1002 19:19:34.191941 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:34.194390 env[1131]: time="2023-10-02T19:19:34.192666020Z" level=info msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" Oct 2 19:19:34.335964 env[1131]: time="2023-10-02T19:19:34.335868329Z" level=error msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" failed" error="failed to destroy network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:34.336311 kubelet[2063]: E1002 19:19:34.336281 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:34.336459 kubelet[2063]: E1002 19:19:34.336388 2063 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784"} Oct 2 19:19:34.336459 kubelet[2063]: E1002 19:19:34.336449 2063 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"18cf6ee5-1e90-4777-98f0-74942dcf3521\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:19:34.336649 kubelet[2063]: E1002 19:19:34.336494 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"18cf6ee5-1e90-4777-98f0-74942dcf3521\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" podUID="18cf6ee5-1e90-4777-98f0-74942dcf3521" Oct 2 19:19:34.343019 env[1131]: time="2023-10-02T19:19:34.342939416Z" level=error msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" failed" error="failed to destroy network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:34.343558 kubelet[2063]: E1002 19:19:34.343514 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:34.343765 kubelet[2063]: E1002 19:19:34.343579 2063 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce"} Oct 2 19:19:34.343765 kubelet[2063]: E1002 19:19:34.343637 2063 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"15d82d10-716e-4228-a123-68bf708ecb9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:19:34.343765 kubelet[2063]: E1002 19:19:34.343680 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"15d82d10-716e-4228-a123-68bf708ecb9c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mv9wl" podUID="15d82d10-716e-4228-a123-68bf708ecb9c" Oct 2 19:19:34.353286 env[1131]: time="2023-10-02T19:19:34.353200950Z" level=error msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" failed" error="failed to destroy network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:34.353598 kubelet[2063]: E1002 19:19:34.353571 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:34.353738 kubelet[2063]: E1002 19:19:34.353631 2063 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286"} Oct 2 19:19:34.353738 kubelet[2063]: E1002 19:19:34.353726 2063 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:19:34.353912 kubelet[2063]: E1002 19:19:34.353770 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:19:34.362054 env[1131]: time="2023-10-02T19:19:34.361957630Z" level=error msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" failed" error="failed to destroy network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:19:34.362372 kubelet[2063]: E1002 19:19:34.362332 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:34.362496 kubelet[2063]: E1002 19:19:34.362390 2063 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363"} Oct 2 19:19:34.362496 kubelet[2063]: E1002 19:19:34.362447 2063 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:19:34.362496 kubelet[2063]: E1002 19:19:34.362491 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-q27g4" podUID="19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5" Oct 2 19:19:39.192677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1112624749.mount: Deactivated successfully. Oct 2 19:19:39.271694 env[1131]: time="2023-10-02T19:19:39.271622131Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:39.274994 env[1131]: time="2023-10-02T19:19:39.274941864Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:39.277821 env[1131]: time="2023-10-02T19:19:39.277760179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:39.279830 env[1131]: time="2023-10-02T19:19:39.279787913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:39.280629 env[1131]: time="2023-10-02T19:19:39.280583501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:19:39.285971 env[1131]: time="2023-10-02T19:19:39.285913339Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:19:39.304802 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3226890231.mount: Deactivated successfully. Oct 2 19:19:39.318378 env[1131]: time="2023-10-02T19:19:39.318297901Z" level=info msg="CreateContainer within sandbox \"ce52405b20a7dd93545702ca56b8d1318ac3aef42f2aba39f6fa8d46e6ffc8b5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6\"" Oct 2 19:19:39.319482 env[1131]: time="2023-10-02T19:19:39.319444544Z" level=info msg="StartContainer for \"1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6\"" Oct 2 19:19:39.352342 systemd[1]: Started cri-containerd-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6.scope. Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.389504 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:19:39.389650 kernel: audit: type=1400 audit(1696274379.382:1113): avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001b96b0 a2=3c a3=8 items=0 ppid=2515 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:39.443314 kernel: audit: type=1300 audit(1696274379.382:1113): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001b96b0 a2=3c a3=8 items=0 ppid=2515 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:39.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343961383263353132326564366634363837353038353837346464 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.516553 kernel: audit: type=1327 audit(1696274379.382:1113): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343961383263353132326564366634363837353038353837346464 Oct 2 19:19:39.516731 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.516776 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.516812 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.558712 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.580403 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.584873 env[1131]: time="2023-10-02T19:19:39.581120519Z" level=info msg="StartContainer for \"1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6\" returns successfully" Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.622820 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.622977 kernel: audit: type=1400 audit(1696274379.382:1114): avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.382000 audit: BPF prog-id=148 op=LOAD Oct 2 19:19:39.382000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001b99d8 a2=78 a3=c0002d1ca0 items=0 ppid=2515 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:39.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343961383263353132326564366634363837353038353837346464 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.441000 audit: BPF prog-id=149 op=LOAD Oct 2 19:19:39.441000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001b9770 a2=78 a3=c0002d1ce8 items=0 ppid=2515 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:39.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343961383263353132326564366634363837353038353837346464 Oct 2 19:19:39.441000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:19:39.442000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:39.442000 audit: BPF prog-id=150 op=LOAD Oct 2 19:19:39.442000 audit[3004]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001b9c30 a2=78 a3=c0002d1d78 items=0 ppid=2515 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:39.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133343961383263353132326564366634363837353038353837346464 Oct 2 19:19:39.693791 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:19:39.693988 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:19:40.265059 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.R1T6yN.mount: Deactivated successfully. Oct 2 19:19:40.279903 kubelet[2063]: I1002 19:19:40.279442 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-6vf9w" podStartSLOduration=3.409922556 podCreationTimestamp="2023-10-02 19:19:21 +0000 UTC" firstStartedPulling="2023-10-02 19:19:23.411510579 +0000 UTC m=+19.670390628" lastFinishedPulling="2023-10-02 19:19:39.280967755 +0000 UTC m=+35.539847798" observedRunningTime="2023-10-02 19:19:40.278286098 +0000 UTC m=+36.537166165" watchObservedRunningTime="2023-10-02 19:19:40.279379726 +0000 UTC m=+36.538259792" Oct 2 19:19:41.167000 audit[3133]: AVC avc: denied { write } for pid=3133 comm="tee" name="fd" dev="proc" ino=23336 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.167000 audit[3133]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc537d0933 a2=241 a3=1b6 items=1 ppid=3096 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.167000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:19:41.167000 audit: PATH item=0 name="/dev/fd/63" inode=23321 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.169000 audit[3137]: AVC avc: denied { write } for pid=3137 comm="tee" name="fd" dev="proc" ino=23340 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.169000 audit[3137]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5234b922 a2=241 a3=1b6 items=1 ppid=3092 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.169000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:19:41.169000 audit: PATH item=0 name="/dev/fd/63" inode=24051 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.172000 audit[3144]: AVC avc: denied { write } for pid=3144 comm="tee" name="fd" dev="proc" ino=23344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.176000 audit[3141]: AVC avc: denied { write } for pid=3141 comm="tee" name="fd" dev="proc" ino=23345 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.172000 audit[3144]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6b5b6932 a2=241 a3=1b6 items=1 ppid=3102 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.172000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:19:41.172000 audit: PATH item=0 name="/dev/fd/63" inode=23331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.172000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.176000 audit[3141]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6430b931 a2=241 a3=1b6 items=1 ppid=3099 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.176000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:19:41.176000 audit: PATH item=0 name="/dev/fd/63" inode=24053 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.181000 audit[3139]: AVC avc: denied { write } for pid=3139 comm="tee" name="fd" dev="proc" ino=23350 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.181000 audit[3139]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0e0b5931 a2=241 a3=1b6 items=1 ppid=3093 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.181000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:19:41.181000 audit: PATH item=0 name="/dev/fd/63" inode=24052 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.194000 audit[3152]: AVC avc: denied { write } for pid=3152 comm="tee" name="fd" dev="proc" ino=23355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.194000 audit[3152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd65f1921 a2=241 a3=1b6 items=1 ppid=3108 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.194000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:19:41.194000 audit: PATH item=0 name="/dev/fd/63" inode=23347 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.194000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.257000 audit[3166]: AVC avc: denied { write } for pid=3166 comm="tee" name="fd" dev="proc" ino=24077 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:19:41.257000 audit[3166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4008c931 a2=241 a3=1b6 items=1 ppid=3098 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.257000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:19:41.257000 audit: PATH item=0 name="/dev/fd/63" inode=24065 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:19:41.257000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:19:41.277797 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.AXLfNX.mount: Deactivated successfully. Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit: BPF prog-id=151 op=LOAD Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff39d00af0 a2=70 a3=7f37bf546000 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit: BPF prog-id=152 op=LOAD Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff39d00af0 a2=70 a3=6e items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff39d00aa0 a2=70 a3=7fff39d00af0 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit: BPF prog-id=153 op=LOAD Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff39d00a80 a2=70 a3=7fff39d00af0 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff39d00b60 a2=70 a3=0 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff39d00b50 a2=70 a3=0 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.845000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.845000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff39d00b90 a2=70 a3=0 items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.845000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.853000 audit: BPF prog-id=154 op=LOAD Oct 2 19:19:41.853000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff39d00ab0 a2=70 a3=ffffffff items=0 ppid=3095 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:19:41.869000 audit[3259]: AVC avc: denied { bpf } for pid=3259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.869000 audit[3259]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8332b880 a2=70 a3=fff80800 items=0 ppid=3095 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:19:41.869000 audit[3259]: AVC avc: denied { bpf } for pid=3259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:41.869000 audit[3259]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8332b750 a2=70 a3=3 items=0 ppid=3095 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.869000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:19:41.877000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:19:41.965000 audit[3279]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=3279 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:41.965000 audit[3279]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd4ffb18b0 a2=0 a3=7ffd4ffb189c items=0 ppid=3095 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:41.971000 audit[3282]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=3282 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:41.971000 audit[3282]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd28946fb0 a2=0 a3=7ffd28946f9c items=0 ppid=3095 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:41.975000 audit[3280]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:41.975000 audit[3280]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff3bc9e350 a2=0 a3=55cf2f599000 items=0 ppid=3095 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.975000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:41.984000 audit[3283]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3283 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:41.984000 audit[3283]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd6bf7a760 a2=0 a3=55cef9d64000 items=0 ppid=3095 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:41.984000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:42.621614 systemd-networkd[1014]: vxlan.calico: Link UP Oct 2 19:19:42.621628 systemd-networkd[1014]: vxlan.calico: Gained carrier Oct 2 19:19:43.258783 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.DvGDcA.mount: Deactivated successfully. Oct 2 19:19:44.011854 systemd-networkd[1014]: vxlan.calico: Gained IPv6LL Oct 2 19:19:46.021535 env[1131]: time="2023-10-02T19:19:46.021403121Z" level=info msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" Oct 2 19:19:46.023837 env[1131]: time="2023-10-02T19:19:46.023404065Z" level=info msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.109 [INFO][3369] k8s.go 576: Cleaning up netns ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.110 [INFO][3369] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" iface="eth0" netns="/var/run/netns/cni-5662468a-9663-fda0-6ed0-d689f3b5b5bf" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.110 [INFO][3369] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" iface="eth0" netns="/var/run/netns/cni-5662468a-9663-fda0-6ed0-d689f3b5b5bf" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.110 [INFO][3369] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" iface="eth0" netns="/var/run/netns/cni-5662468a-9663-fda0-6ed0-d689f3b5b5bf" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.110 [INFO][3369] k8s.go 583: Releasing IP address(es) ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.110 [INFO][3369] utils.go 196: Calico CNI releasing IP address ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.194 [INFO][3381] ipam_plugin.go 416: Releasing address using handleID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.209290 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:46.209290 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.203 [WARNING][3381] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.204 [INFO][3381] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.209290 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:46.209290 env[1131]: 2023-10-02 19:19:46.208 [INFO][3369] k8s.go 589: Teardown processing complete. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:19:46.210199 env[1131]: time="2023-10-02T19:19:46.210110699Z" level=info msg="TearDown network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" successfully" Oct 2 19:19:46.210396 env[1131]: time="2023-10-02T19:19:46.210367182Z" level=info msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" returns successfully" Oct 2 19:19:46.211514 env[1131]: time="2023-10-02T19:19:46.211469079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-htm56,Uid:337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8,Namespace:calico-system,Attempt:1,}" Oct 2 19:19:46.216042 systemd[1]: run-netns-cni\x2d5662468a\x2d9663\x2dfda0\x2d6ed0\x2dd689f3b5b5bf.mount: Deactivated successfully. Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.113 [INFO][3370] k8s.go 576: Cleaning up netns ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.113 [INFO][3370] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" iface="eth0" netns="/var/run/netns/cni-9a7b6a69-ea2f-04a1-2908-0c5365e153b5" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.113 [INFO][3370] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" iface="eth0" netns="/var/run/netns/cni-9a7b6a69-ea2f-04a1-2908-0c5365e153b5" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.113 [INFO][3370] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" iface="eth0" netns="/var/run/netns/cni-9a7b6a69-ea2f-04a1-2908-0c5365e153b5" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.114 [INFO][3370] k8s.go 583: Releasing IP address(es) ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.114 [INFO][3370] utils.go 196: Calico CNI releasing IP address ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.203 [INFO][3382] ipam_plugin.go 416: Releasing address using handleID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.232605 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:46.232605 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.220 [WARNING][3382] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.220 [INFO][3382] ipam_plugin.go 444: Releasing address using workloadID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.232605 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:46.232605 env[1131]: 2023-10-02 19:19:46.230 [INFO][3370] k8s.go 589: Teardown processing complete. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:19:46.237964 env[1131]: time="2023-10-02T19:19:46.236396655Z" level=info msg="TearDown network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" successfully" Oct 2 19:19:46.237964 env[1131]: time="2023-10-02T19:19:46.236454291Z" level=info msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" returns successfully" Oct 2 19:19:46.236858 systemd[1]: run-netns-cni\x2d9a7b6a69\x2dea2f\x2d04a1\x2d2908\x2d0c5365e153b5.mount: Deactivated successfully. Oct 2 19:19:46.241199 env[1131]: time="2023-10-02T19:19:46.239477217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-q27g4,Uid:19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5,Namespace:kube-system,Attempt:1,}" Oct 2 19:19:46.482347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:19:46.482569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali27723702b67: link becomes ready Oct 2 19:19:46.498858 systemd-networkd[1014]: cali27723702b67: Link UP Oct 2 19:19:46.498867 systemd-networkd[1014]: cali27723702b67: Gained carrier Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.352 [INFO][3403] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0 coredns-5dd5756b68- kube-system 19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5 697 0 2023-10-02 19:19:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal coredns-5dd5756b68-q27g4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali27723702b67 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.353 [INFO][3403] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.409 [INFO][3417] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" HandleID="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.424 [INFO][3417] ipam_plugin.go 269: Auto assigning IP ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" HandleID="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-q27g4", "timestamp":"2023-10-02 19:19:46.40994067 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:46.515311 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:46.515311 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.424 [INFO][3417] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.426 [INFO][3417] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.431 [INFO][3417] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.435 [INFO][3417] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.437 [INFO][3417] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.440 [INFO][3417] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.440 [INFO][3417] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.442 [INFO][3417] ipam.go 1682: Creating new handle: k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9 Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.447 [INFO][3417] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.454 [INFO][3417] ipam.go 1216: Successfully claimed IPs: [192.168.85.1/26] block=192.168.85.0/26 handle="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.454 [INFO][3417] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.1/26] handle="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.515311 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:46.515311 env[1131]: 2023-10-02 19:19:46.454 [INFO][3417] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.1/26] IPv6=[] ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" HandleID="k8s-pod-network.ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.457 [INFO][3403] k8s.go 383: Populated endpoint ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-q27g4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27723702b67", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.464 [INFO][3403] k8s.go 384: Calico CNI using IPs: [192.168.85.1/32] ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.465 [INFO][3403] dataplane_linux.go 68: Setting the host side veth name to cali27723702b67 ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.483 [INFO][3403] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.492 [INFO][3403] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9", Pod:"coredns-5dd5756b68-q27g4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27723702b67", MAC:"5a:5c:bc:5d:cb:96", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:46.516575 env[1131]: 2023-10-02 19:19:46.513 [INFO][3403] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9" Namespace="kube-system" Pod="coredns-5dd5756b68-q27g4" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:19:46.539386 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ddc0a5698a: link becomes ready Oct 2 19:19:46.558217 systemd-networkd[1014]: cali8ddc0a5698a: Link UP Oct 2 19:19:46.558228 systemd-networkd[1014]: cali8ddc0a5698a: Gained carrier Oct 2 19:19:46.582429 env[1131]: time="2023-10-02T19:19:46.582334467Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:46.582614 env[1131]: time="2023-10-02T19:19:46.582458517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:46.582614 env[1131]: time="2023-10-02T19:19:46.582501157Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:46.582796 env[1131]: time="2023-10-02T19:19:46.582758605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9 pid=3454 runtime=io.containerd.runc.v2 Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.354 [INFO][3393] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0 csi-node-driver- calico-system 337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8 696 0 2023-10-02 19:19:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal csi-node-driver-htm56 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali8ddc0a5698a [] []}} ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.354 [INFO][3393] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.409 [INFO][3418] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" HandleID="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.425 [INFO][3418] ipam_plugin.go 269: Auto assigning IP ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" HandleID="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"csi-node-driver-htm56", "timestamp":"2023-10-02 19:19:46.409896163 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:46.586235 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:46.586235 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.454 [INFO][3418] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.457 [INFO][3418] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.463 [INFO][3418] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.483 [INFO][3418] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.494 [INFO][3418] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.497 [INFO][3418] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.497 [INFO][3418] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.499 [INFO][3418] ipam.go 1682: Creating new handle: k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.508 [INFO][3418] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.522 [INFO][3418] ipam.go 1216: Successfully claimed IPs: [192.168.85.2/26] block=192.168.85.0/26 handle="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.522 [INFO][3418] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.2/26] handle="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:46.586235 env[1131]: time="2023-10-02T19:19:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:46.586235 env[1131]: 2023-10-02 19:19:46.523 [INFO][3418] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.2/26] IPv6=[] ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" HandleID="k8s-pod-network.c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.525 [INFO][3393] k8s.go 383: Populated endpoint ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-htm56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ddc0a5698a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.525 [INFO][3393] k8s.go 384: Calico CNI using IPs: [192.168.85.2/32] ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.525 [INFO][3393] dataplane_linux.go 68: Setting the host side veth name to cali8ddc0a5698a ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.543 [INFO][3393] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.551 [INFO][3393] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c", Pod:"csi-node-driver-htm56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ddc0a5698a", MAC:"b6:b0:f7:6c:5b:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:46.589884 env[1131]: 2023-10-02 19:19:46.570 [INFO][3393] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c" Namespace="calico-system" Pod="csi-node-driver-htm56" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:19:46.616457 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:19:46.616671 kernel: audit: type=1325 audit(1696274386.608:1144): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:46.608000 audit[3466]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:46.608000 audit[3466]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd8d19e950 a2=0 a3=7ffd8d19e93c items=0 ppid=3095 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.654827 env[1131]: time="2023-10-02T19:19:46.654698630Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:46.655160 env[1131]: time="2023-10-02T19:19:46.655072383Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:46.655316 env[1131]: time="2023-10-02T19:19:46.655283851Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:46.655660 env[1131]: time="2023-10-02T19:19:46.655621992Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c pid=3492 runtime=io.containerd.runc.v2 Oct 2 19:19:46.665950 kernel: audit: type=1300 audit(1696274386.608:1144): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd8d19e950 a2=0 a3=7ffd8d19e93c items=0 ppid=3095 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.672362 systemd[1]: Started cri-containerd-ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9.scope. Oct 2 19:19:46.608000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:46.698178 kernel: audit: type=1327 audit(1696274386.608:1144): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:46.715267 systemd[1]: Started cri-containerd-c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c.scope. Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.746381 kernel: audit: type=1400 audit(1696274386.723:1145): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.770289 kernel: audit: type=1400 audit(1696274386.723:1146): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.793295 kernel: audit: type=1400 audit(1696274386.723:1147): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.816277 kernel: audit: type=1400 audit(1696274386.723:1148): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.848182 kernel: audit: type=1400 audit(1696274386.723:1149): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.874906 kernel: audit: type=1400 audit(1696274386.723:1150): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.902248 kernel: audit: type=1400 audit(1696274386.723:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.724000 audit: BPF prog-id=155 op=LOAD Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3454 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261386532643839633032356561373232366363656138306561323366 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3454 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261386532643839633032356561373232366363656138306561323366 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.748000 audit: BPF prog-id=156 op=LOAD Oct 2 19:19:46.748000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024510 items=0 ppid=3454 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261386532643839633032356561373232366363656138306561323366 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit: BPF prog-id=157 op=LOAD Oct 2 19:19:46.815000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024558 items=0 ppid=3454 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261386532643839633032356561373232366363656138306561323366 Oct 2 19:19:46.815000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:19:46.815000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { perfmon } for pid=3467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit[3467]: AVC avc: denied { bpf } for pid=3467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.815000 audit: BPF prog-id=158 op=LOAD Oct 2 19:19:46.815000 audit[3467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024968 items=0 ppid=3454 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261386532643839633032356561373232366363656138306561323366 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.904000 audit[3532]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:46.904000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff6a1f0440 a2=0 a3=7fff6a1f042c items=0 ppid=3095 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:46.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.911000 audit: BPF prog-id=159 op=LOAD Oct 2 19:19:46.920000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.920000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3492 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313265326238643635383735656464623966396130633031333932 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3492 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313265326238643635383735656464623966396130633031333932 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.921000 audit: BPF prog-id=160 op=LOAD Oct 2 19:19:46.921000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032c6f0 items=0 ppid=3492 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313265326238643635383735656464623966396130633031333932 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit: BPF prog-id=161 op=LOAD Oct 2 19:19:46.922000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032c738 items=0 ppid=3492 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313265326238643635383735656464623966396130633031333932 Oct 2 19:19:46.922000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:19:46.922000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.922000 audit: BPF prog-id=162 op=LOAD Oct 2 19:19:46.922000 audit[3503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032cb48 items=0 ppid=3492 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313265326238643635383735656464623966396130633031333932 Oct 2 19:19:46.949071 env[1131]: time="2023-10-02T19:19:46.948974284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-q27g4,Uid:19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5,Namespace:kube-system,Attempt:1,} returns sandbox id \"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9\"" Oct 2 19:19:46.953301 env[1131]: time="2023-10-02T19:19:46.953251495Z" level=info msg="CreateContainer within sandbox \"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:19:46.957805 env[1131]: time="2023-10-02T19:19:46.957741695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-htm56,Uid:337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8,Namespace:calico-system,Attempt:1,} returns sandbox id \"c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c\"" Oct 2 19:19:46.959955 env[1131]: time="2023-10-02T19:19:46.959917292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:19:46.975441 env[1131]: time="2023-10-02T19:19:46.975345349Z" level=info msg="CreateContainer within sandbox \"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c5d98fdb7f62808587ad37abb5673c2de5ed0a0a7ec6a6a76f25bad39544f333\"" Oct 2 19:19:46.978990 env[1131]: time="2023-10-02T19:19:46.978804059Z" level=info msg="StartContainer for \"c5d98fdb7f62808587ad37abb5673c2de5ed0a0a7ec6a6a76f25bad39544f333\"" Oct 2 19:19:47.004727 systemd[1]: Started cri-containerd-c5d98fdb7f62808587ad37abb5673c2de5ed0a0a7ec6a6a76f25bad39544f333.scope. Oct 2 19:19:47.024196 env[1131]: time="2023-10-02T19:19:47.023629519Z" level=info msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.031000 audit: BPF prog-id=163 op=LOAD Oct 2 19:19:47.031000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.031000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643938666462376636323830383538376164333761626235363733 Oct 2 19:19:47.031000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.031000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643938666462376636323830383538376164333761626235363733 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit: BPF prog-id=164 op=LOAD Oct 2 19:19:47.032000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000344a10 items=0 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643938666462376636323830383538376164333761626235363733 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit: BPF prog-id=165 op=LOAD Oct 2 19:19:47.032000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000344a58 items=0 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643938666462376636323830383538376164333761626235363733 Oct 2 19:19:47.032000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:19:47.032000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.032000 audit: BPF prog-id=166 op=LOAD Oct 2 19:19:47.032000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000344e68 items=0 ppid=3454 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643938666462376636323830383538376164333761626235363733 Oct 2 19:19:47.061835 env[1131]: time="2023-10-02T19:19:47.061780537Z" level=info msg="StartContainer for \"c5d98fdb7f62808587ad37abb5673c2de5ed0a0a7ec6a6a76f25bad39544f333\" returns successfully" Oct 2 19:19:47.093397 env[1131]: time="2023-10-02T19:19:47.093320734Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:47.095663 env[1131]: time="2023-10-02T19:19:47.095586707Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:47.098547 kubelet[2063]: E1002 19:19:47.096317 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:47.098547 kubelet[2063]: E1002 19:19:47.096393 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:47.099212 kubelet[2063]: E1002 19:19:47.096601 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:47.101630 env[1131]: time="2023-10-02T19:19:47.101592298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.142 [INFO][3592] k8s.go 576: Cleaning up netns ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.142 [INFO][3592] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" iface="eth0" netns="/var/run/netns/cni-ca24cc6b-e0f6-a0d5-7f7c-268f79c68d28" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.142 [INFO][3592] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" iface="eth0" netns="/var/run/netns/cni-ca24cc6b-e0f6-a0d5-7f7c-268f79c68d28" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.144 [INFO][3592] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" iface="eth0" netns="/var/run/netns/cni-ca24cc6b-e0f6-a0d5-7f7c-268f79c68d28" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.144 [INFO][3592] k8s.go 583: Releasing IP address(es) ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.144 [INFO][3592] utils.go 196: Calico CNI releasing IP address ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.182 [INFO][3604] ipam_plugin.go 416: Releasing address using handleID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.194909 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:47.194909 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.189 [WARNING][3604] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.189 [INFO][3604] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.194909 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:47.194909 env[1131]: 2023-10-02 19:19:47.193 [INFO][3592] k8s.go 589: Teardown processing complete. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:19:47.195631 env[1131]: time="2023-10-02T19:19:47.195067730Z" level=info msg="TearDown network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" successfully" Oct 2 19:19:47.195631 env[1131]: time="2023-10-02T19:19:47.195113764Z" level=info msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" returns successfully" Oct 2 19:19:47.196658 env[1131]: time="2023-10-02T19:19:47.196614582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mv9wl,Uid:15d82d10-716e-4228-a123-68bf708ecb9c,Namespace:kube-system,Attempt:1,}" Oct 2 19:19:47.231460 systemd[1]: run-netns-cni\x2dca24cc6b\x2de0f6\x2da0d5\x2d7f7c\x2d268f79c68d28.mount: Deactivated successfully. Oct 2 19:19:47.238189 env[1131]: time="2023-10-02T19:19:47.235539255Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:47.244211 env[1131]: time="2023-10-02T19:19:47.243184960Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:47.244395 kubelet[2063]: E1002 19:19:47.243495 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:47.244395 kubelet[2063]: E1002 19:19:47.243541 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:47.244395 kubelet[2063]: E1002 19:19:47.243661 2063 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:47.244395 kubelet[2063]: E1002 19:19:47.243738 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:19:47.263675 kubelet[2063]: E1002 19:19:47.263584 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:19:47.309058 kubelet[2063]: I1002 19:19:47.308902 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-q27g4" podStartSLOduration=31.308852922 podCreationTimestamp="2023-10-02 19:19:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:47.285920649 +0000 UTC m=+43.544800713" watchObservedRunningTime="2023-10-02 19:19:47.308852922 +0000 UTC m=+43.567732990" Oct 2 19:19:47.345000 audit[3625]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:47.345000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdf0dc21b0 a2=0 a3=7ffdf0dc219c items=0 ppid=2249 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:47.346000 audit[3625]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3625 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:47.346000 audit[3625]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffdf0dc21b0 a2=0 a3=31030 items=0 ppid=2249 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:47.388000 audit[3631]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:47.388000 audit[3631]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd7a6bde20 a2=0 a3=7ffd7a6bde0c items=0 ppid=2249 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:47.391000 audit[3631]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:47.391000 audit[3631]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd7a6bde20 a2=0 a3=7ffd7a6bde0c items=0 ppid=2249 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:47.456321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0eb87eb136e: link becomes ready Oct 2 19:19:47.461498 systemd-networkd[1014]: cali0eb87eb136e: Link UP Oct 2 19:19:47.461511 systemd-networkd[1014]: cali0eb87eb136e: Gained carrier Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.357 [INFO][3612] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0 coredns-5dd5756b68- kube-system 15d82d10-716e-4228-a123-68bf708ecb9c 715 0 2023-10-02 19:19:16 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal coredns-5dd5756b68-mv9wl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0eb87eb136e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.357 [INFO][3612] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.406 [INFO][3626] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" HandleID="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.416 [INFO][3626] ipam_plugin.go 269: Auto assigning IP ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" HandleID="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000423fb0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-mv9wl", "timestamp":"2023-10-02 19:19:47.406612844 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:47.485724 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:47.485724 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.417 [INFO][3626] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.419 [INFO][3626] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.423 [INFO][3626] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.427 [INFO][3626] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.429 [INFO][3626] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.432 [INFO][3626] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.432 [INFO][3626] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.433 [INFO][3626] ipam.go 1682: Creating new handle: k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30 Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.437 [INFO][3626] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.444 [INFO][3626] ipam.go 1216: Successfully claimed IPs: [192.168.85.3/26] block=192.168.85.0/26 handle="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.444 [INFO][3626] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.3/26] handle="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:47.485724 env[1131]: time="2023-10-02T19:19:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:47.485724 env[1131]: 2023-10-02 19:19:47.444 [INFO][3626] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.3/26] IPv6=[] ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" HandleID="k8s-pod-network.6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.446 [INFO][3612] k8s.go 383: Populated endpoint ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"15d82d10-716e-4228-a123-68bf708ecb9c", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-mv9wl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0eb87eb136e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.446 [INFO][3612] k8s.go 384: Calico CNI using IPs: [192.168.85.3/32] ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.446 [INFO][3612] dataplane_linux.go 68: Setting the host side veth name to cali0eb87eb136e ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.456 [INFO][3612] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.461 [INFO][3612] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"15d82d10-716e-4228-a123-68bf708ecb9c", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30", Pod:"coredns-5dd5756b68-mv9wl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0eb87eb136e", MAC:"16:b8:8c:98:67:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:47.486955 env[1131]: 2023-10-02 19:19:47.483 [INFO][3612] k8s.go 489: Wrote updated endpoint to datastore ContainerID="6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30" Namespace="kube-system" Pod="coredns-5dd5756b68-mv9wl" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:19:47.510655 env[1131]: time="2023-10-02T19:19:47.510554202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:47.510919 env[1131]: time="2023-10-02T19:19:47.510879897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:47.511062 env[1131]: time="2023-10-02T19:19:47.511029554Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:47.511503 env[1131]: time="2023-10-02T19:19:47.511456203Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30 pid=3655 runtime=io.containerd.runc.v2 Oct 2 19:19:47.533000 audit[3671]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3671 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:47.533000 audit[3671]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7ffcfd88f990 a2=0 a3=7ffcfd88f97c items=0 ppid=3095 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.533000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:47.552893 systemd[1]: Started cri-containerd-6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30.scope. Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.574000 audit: BPF prog-id=167 op=LOAD Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3655 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630303362383666306533336430346565303436323461613131313236 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3655 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630303362383666306533336430346565303436323461613131313236 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit: BPF prog-id=168 op=LOAD Oct 2 19:19:47.577000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002857e0 items=0 ppid=3655 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630303362383666306533336430346565303436323461613131313236 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit: BPF prog-id=169 op=LOAD Oct 2 19:19:47.577000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000285828 items=0 ppid=3655 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630303362383666306533336430346565303436323461613131313236 Oct 2 19:19:47.577000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:19:47.577000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.577000 audit: BPF prog-id=170 op=LOAD Oct 2 19:19:47.577000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000285c38 items=0 ppid=3655 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630303362383666306533336430346565303436323461613131313236 Oct 2 19:19:47.623128 env[1131]: time="2023-10-02T19:19:47.623061095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mv9wl,Uid:15d82d10-716e-4228-a123-68bf708ecb9c,Namespace:kube-system,Attempt:1,} returns sandbox id \"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30\"" Oct 2 19:19:47.629924 env[1131]: time="2023-10-02T19:19:47.629869280Z" level=info msg="CreateContainer within sandbox \"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:19:47.645361 env[1131]: time="2023-10-02T19:19:47.645278384Z" level=info msg="CreateContainer within sandbox \"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6d737d4e862138691f0e331fd20e0c79e01ce9860ee02345e160088491790f0c\"" Oct 2 19:19:47.648005 env[1131]: time="2023-10-02T19:19:47.647956111Z" level=info msg="StartContainer for \"6d737d4e862138691f0e331fd20e0c79e01ce9860ee02345e160088491790f0c\"" Oct 2 19:19:47.673997 systemd[1]: Started cri-containerd-6d737d4e862138691f0e331fd20e0c79e01ce9860ee02345e160088491790f0c.scope. Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.696000 audit: BPF prog-id=171 op=LOAD Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3655 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664373337643465383632313338363931663065333331666432306530 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3655 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664373337643465383632313338363931663065333331666432306530 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit: BPF prog-id=172 op=LOAD Oct 2 19:19:47.698000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000207490 items=0 ppid=3655 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664373337643465383632313338363931663065333331666432306530 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit: BPF prog-id=173 op=LOAD Oct 2 19:19:47.698000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002074d8 items=0 ppid=3655 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664373337643465383632313338363931663065333331666432306530 Oct 2 19:19:47.698000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:19:47.698000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.698000 audit: BPF prog-id=174 op=LOAD Oct 2 19:19:47.698000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002078e8 items=0 ppid=3655 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664373337643465383632313338363931663065333331666432306530 Oct 2 19:19:47.727349 env[1131]: time="2023-10-02T19:19:47.727288614Z" level=info msg="StartContainer for \"6d737d4e862138691f0e331fd20e0c79e01ce9860ee02345e160088491790f0c\" returns successfully" Oct 2 19:19:48.022838 env[1131]: time="2023-10-02T19:19:48.022781992Z" level=info msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" Oct 2 19:19:48.042388 systemd-networkd[1014]: cali8ddc0a5698a: Gained IPv6LL Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.085 [INFO][3743] k8s.go 576: Cleaning up netns ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.085 [INFO][3743] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" iface="eth0" netns="/var/run/netns/cni-e5f31f02-77cb-6faf-4c01-3533fa139e0f" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.086 [INFO][3743] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" iface="eth0" netns="/var/run/netns/cni-e5f31f02-77cb-6faf-4c01-3533fa139e0f" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.086 [INFO][3743] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" iface="eth0" netns="/var/run/netns/cni-e5f31f02-77cb-6faf-4c01-3533fa139e0f" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.086 [INFO][3743] k8s.go 583: Releasing IP address(es) ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.086 [INFO][3743] utils.go 196: Calico CNI releasing IP address ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.119 [INFO][3749] ipam_plugin.go 416: Releasing address using handleID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.130431 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:48.130431 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.126 [WARNING][3749] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.126 [INFO][3749] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.130431 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:48.130431 env[1131]: 2023-10-02 19:19:48.129 [INFO][3743] k8s.go 589: Teardown processing complete. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:19:48.131506 env[1131]: time="2023-10-02T19:19:48.131412018Z" level=info msg="TearDown network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" successfully" Oct 2 19:19:48.131506 env[1131]: time="2023-10-02T19:19:48.131460649Z" level=info msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" returns successfully" Oct 2 19:19:48.132568 env[1131]: time="2023-10-02T19:19:48.132525363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-t7dgc,Uid:18cf6ee5-1e90-4777-98f0-74942dcf3521,Namespace:calico-system,Attempt:1,}" Oct 2 19:19:48.220361 systemd[1]: run-containerd-runc-k8s.io-6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30-runc.gWn5lq.mount: Deactivated successfully. Oct 2 19:19:48.220783 systemd[1]: run-netns-cni\x2de5f31f02\x2d77cb\x2d6faf\x2d4c01\x2d3533fa139e0f.mount: Deactivated successfully. Oct 2 19:19:48.275837 kubelet[2063]: E1002 19:19:48.274692 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:19:48.286297 kubelet[2063]: I1002 19:19:48.286265 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-mv9wl" podStartSLOduration=32.286193861 podCreationTimestamp="2023-10-02 19:19:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:48.283739031 +0000 UTC m=+44.542619097" watchObservedRunningTime="2023-10-02 19:19:48.286193861 +0000 UTC m=+44.545073926" Oct 2 19:19:48.333232 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:19:48.342192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f45b69e893: link becomes ready Oct 2 19:19:48.360467 systemd-networkd[1014]: cali4f45b69e893: Link UP Oct 2 19:19:48.360479 systemd-networkd[1014]: cali4f45b69e893: Gained carrier Oct 2 19:19:48.368476 systemd-networkd[1014]: cali27723702b67: Gained IPv6LL Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.189 [INFO][3756] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0 calico-kube-controllers-74b9887bb6- calico-system 18cf6ee5-1e90-4777-98f0-74942dcf3521 738 0 2023-10-02 19:19:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal calico-kube-controllers-74b9887bb6-t7dgc eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali4f45b69e893 [] []}} ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.190 [INFO][3756] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.244 [INFO][3767] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" HandleID="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.259 [INFO][3767] ipam_plugin.go 269: Auto assigning IP ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" HandleID="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000545020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"calico-kube-controllers-74b9887bb6-t7dgc", "timestamp":"2023-10-02 19:19:48.244211516 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:48.387514 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:48.387514 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.260 [INFO][3767] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.261 [INFO][3767] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.266 [INFO][3767] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.289 [INFO][3767] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.294 [INFO][3767] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.301 [INFO][3767] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.301 [INFO][3767] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.308 [INFO][3767] ipam.go 1682: Creating new handle: k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.313 [INFO][3767] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.322 [INFO][3767] ipam.go 1216: Successfully claimed IPs: [192.168.85.4/26] block=192.168.85.0/26 handle="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.322 [INFO][3767] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.4/26] handle="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:48.387514 env[1131]: time="2023-10-02T19:19:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:48.387514 env[1131]: 2023-10-02 19:19:48.322 [INFO][3767] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.4/26] IPv6=[] ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" HandleID="k8s-pod-network.619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.324 [INFO][3756] k8s.go 383: Populated endpoint ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"18cf6ee5-1e90-4777-98f0-74942dcf3521", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-t7dgc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f45b69e893", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.324 [INFO][3756] k8s.go 384: Calico CNI using IPs: [192.168.85.4/32] ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.324 [INFO][3756] dataplane_linux.go 68: Setting the host side veth name to cali4f45b69e893 ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.347 [INFO][3756] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.372 [INFO][3756] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"18cf6ee5-1e90-4777-98f0-74942dcf3521", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b", Pod:"calico-kube-controllers-74b9887bb6-t7dgc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f45b69e893", MAC:"ae:50:2f:63:94:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:48.388762 env[1131]: 2023-10-02 19:19:48.385 [INFO][3756] k8s.go 489: Wrote updated endpoint to datastore ContainerID="619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-t7dgc" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:19:48.414422 env[1131]: time="2023-10-02T19:19:48.414341884Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:48.413000 audit[3785]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:48.413000 audit[3785]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffff80d7150 a2=0 a3=7ffff80d713c items=0 ppid=2249 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:48.415098 env[1131]: time="2023-10-02T19:19:48.414674464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:48.415371 env[1131]: time="2023-10-02T19:19:48.415327196Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:48.415716 env[1131]: time="2023-10-02T19:19:48.415671725Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b pid=3793 runtime=io.containerd.runc.v2 Oct 2 19:19:48.427000 audit[3785]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=3785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:48.427000 audit[3785]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffff80d7150 a2=0 a3=7ffff80d713c items=0 ppid=2249 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:48.457991 systemd[1]: run-containerd-runc-k8s.io-619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b-runc.e3jTWI.mount: Deactivated successfully. Oct 2 19:19:48.464549 systemd[1]: Started cri-containerd-619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b.scope. Oct 2 19:19:48.490000 audit[3821]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:48.490000 audit[3821]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffd9bc25170 a2=0 a3=7ffd9bc2515c items=0 ppid=3095 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.490000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.492000 audit: BPF prog-id=175 op=LOAD Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631396162663266656261623737376538646163386634663931313064 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631396162663266656261623737376538646163386634663931313064 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit: BPF prog-id=176 op=LOAD Oct 2 19:19:48.493000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308610 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631396162663266656261623737376538646163386634663931313064 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit: BPF prog-id=177 op=LOAD Oct 2 19:19:48.493000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308658 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631396162663266656261623737376538646163386634663931313064 Oct 2 19:19:48.493000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:19:48.493000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { perfmon } for pid=3803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit[3803]: AVC avc: denied { bpf } for pid=3803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:48.493000 audit: BPF prog-id=178 op=LOAD Oct 2 19:19:48.493000 audit[3803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308a68 items=0 ppid=3793 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:48.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631396162663266656261623737376538646163386634663931313064 Oct 2 19:19:48.542550 env[1131]: time="2023-10-02T19:19:48.538412921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-t7dgc,Uid:18cf6ee5-1e90-4777-98f0-74942dcf3521,Namespace:calico-system,Attempt:1,} returns sandbox id \"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b\"" Oct 2 19:19:48.542957 env[1131]: time="2023-10-02T19:19:48.542899884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:19:48.874378 systemd-networkd[1014]: cali0eb87eb136e: Gained IPv6LL Oct 2 19:19:49.431205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3737232157.mount: Deactivated successfully. Oct 2 19:19:49.440000 audit[3833]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:49.440000 audit[3833]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdddafc300 a2=0 a3=7ffdddafc2ec items=0 ppid=2249 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:49.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:49.442000 audit[3833]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:49.442000 audit[3833]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdddafc300 a2=0 a3=7ffdddafc2ec items=0 ppid=2249 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:49.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:49.450361 systemd-networkd[1014]: cali4f45b69e893: Gained IPv6LL Oct 2 19:19:50.882118 env[1131]: time="2023-10-02T19:19:50.882048988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:50.885292 env[1131]: time="2023-10-02T19:19:50.885234378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:50.888262 env[1131]: time="2023-10-02T19:19:50.888215875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:50.891915 env[1131]: time="2023-10-02T19:19:50.891863155Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:50.893113 env[1131]: time="2023-10-02T19:19:50.893051838Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:19:50.897437 env[1131]: time="2023-10-02T19:19:50.897277103Z" level=info msg="CreateContainer within sandbox \"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:19:50.915993 env[1131]: time="2023-10-02T19:19:50.915923914Z" level=info msg="CreateContainer within sandbox \"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937\"" Oct 2 19:19:50.918596 env[1131]: time="2023-10-02T19:19:50.917399184Z" level=info msg="StartContainer for \"3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937\"" Oct 2 19:19:50.956402 systemd[1]: Started cri-containerd-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937.scope. Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.972000 audit: BPF prog-id=179 op=LOAD Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3793 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:50.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363965643630353163373566663162663136303530383065376434 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3793 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:50.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363965643630353163373566663162663136303530383065376434 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit: BPF prog-id=180 op=LOAD Oct 2 19:19:50.974000 audit[3851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000213140 items=0 ppid=3793 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:50.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363965643630353163373566663162663136303530383065376434 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.974000 audit: BPF prog-id=181 op=LOAD Oct 2 19:19:50.974000 audit[3851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000213188 items=0 ppid=3793 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:50.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363965643630353163373566663162663136303530383065376434 Oct 2 19:19:50.974000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:19:50.974000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { perfmon } for pid=3851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit[3851]: AVC avc: denied { bpf } for pid=3851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:50.975000 audit: BPF prog-id=182 op=LOAD Oct 2 19:19:50.975000 audit[3851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213598 items=0 ppid=3793 pid=3851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:50.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362363965643630353163373566663162663136303530383065376434 Oct 2 19:19:51.000703 env[1131]: time="2023-10-02T19:19:51.000608032Z" level=info msg="StartContainer for \"3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937\" returns successfully" Oct 2 19:19:51.298892 kubelet[2063]: I1002 19:19:51.298594 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-t7dgc" podStartSLOduration=27.946004469000002 podCreationTimestamp="2023-10-02 19:19:21 +0000 UTC" firstStartedPulling="2023-10-02 19:19:48.540935691 +0000 UTC m=+44.799815744" lastFinishedPulling="2023-10-02 19:19:50.893470009 +0000 UTC m=+47.152350067" observedRunningTime="2023-10-02 19:19:51.295988993 +0000 UTC m=+47.554869058" watchObservedRunningTime="2023-10-02 19:19:51.298538792 +0000 UTC m=+47.557418856" Oct 2 19:19:51.911185 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.uZy4fy.mount: Deactivated successfully. Oct 2 19:19:56.071975 kubelet[2063]: I1002 19:19:56.071919 2063 topology_manager.go:215] "Topology Admit Handler" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" podNamespace="calico-apiserver" podName="calico-apiserver-85fdcc9864-58q54" Oct 2 19:19:56.080722 systemd[1]: Created slice kubepods-besteffort-pod0e3e935f_2dd4_4a13_8c73_84f98c64ae23.slice. Oct 2 19:19:56.103500 kubelet[2063]: I1002 19:19:56.103458 2063 topology_manager.go:215] "Topology Admit Handler" podUID="dda73f2b-f135-430b-84e2-e07847f76355" podNamespace="calico-apiserver" podName="calico-apiserver-85fdcc9864-76csj" Oct 2 19:19:56.112206 systemd[1]: Created slice kubepods-besteffort-poddda73f2b_f135_430b_84e2_e07847f76355.slice. Oct 2 19:19:56.173000 audit[3946]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=3946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.185278 kernel: kauditd_printk_skb: 425 callbacks suppressed Oct 2 19:19:56.185489 kernel: audit: type=1325 audit(1696274396.173:1282): table=filter:113 family=2 entries=9 op=nft_register_rule pid=3946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.173000 audit[3946]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd689181c0 a2=0 a3=7ffd689181ac items=0 ppid=2249 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.207819 kubelet[2063]: I1002 19:19:56.207776 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dda73f2b-f135-430b-84e2-e07847f76355-calico-apiserver-certs\") pod \"calico-apiserver-85fdcc9864-76csj\" (UID: \"dda73f2b-f135-430b-84e2-e07847f76355\") " pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" Oct 2 19:19:56.208210 kubelet[2063]: I1002 19:19:56.208191 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0e3e935f-2dd4-4a13-8c73-84f98c64ae23-calico-apiserver-certs\") pod \"calico-apiserver-85fdcc9864-58q54\" (UID: \"0e3e935f-2dd4-4a13-8c73-84f98c64ae23\") " pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" Oct 2 19:19:56.208452 kubelet[2063]: I1002 19:19:56.208433 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ff6td\" (UniqueName: \"kubernetes.io/projected/dda73f2b-f135-430b-84e2-e07847f76355-kube-api-access-ff6td\") pod \"calico-apiserver-85fdcc9864-76csj\" (UID: \"dda73f2b-f135-430b-84e2-e07847f76355\") " pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" Oct 2 19:19:56.208640 kubelet[2063]: I1002 19:19:56.208618 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7fh7\" (UniqueName: \"kubernetes.io/projected/0e3e935f-2dd4-4a13-8c73-84f98c64ae23-kube-api-access-f7fh7\") pod \"calico-apiserver-85fdcc9864-58q54\" (UID: \"0e3e935f-2dd4-4a13-8c73-84f98c64ae23\") " pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" Oct 2 19:19:56.229918 kernel: audit: type=1300 audit(1696274396.173:1282): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd689181c0 a2=0 a3=7ffd689181ac items=0 ppid=2249 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.262301 kernel: audit: type=1327 audit(1696274396.173:1282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.262477 kernel: audit: type=1325 audit(1696274396.173:1283): table=nat:114 family=2 entries=20 op=nft_register_rule pid=3946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.173000 audit[3946]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.173000 audit[3946]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd689181c0 a2=0 a3=7ffd689181ac items=0 ppid=2249 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.314538 kernel: audit: type=1300 audit(1696274396.173:1283): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd689181c0 a2=0 a3=7ffd689181ac items=0 ppid=2249 pid=3946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.314729 kernel: audit: type=1327 audit(1696274396.173:1283): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.314845 kubelet[2063]: E1002 19:19:56.310508 2063 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:19:56.314845 kubelet[2063]: E1002 19:19:56.310593 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/dda73f2b-f135-430b-84e2-e07847f76355-calico-apiserver-certs podName:dda73f2b-f135-430b-84e2-e07847f76355 nodeName:}" failed. No retries permitted until 2023-10-02 19:19:56.810571214 +0000 UTC m=+53.069451253 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/dda73f2b-f135-430b-84e2-e07847f76355-calico-apiserver-certs") pod "calico-apiserver-85fdcc9864-76csj" (UID: "dda73f2b-f135-430b-84e2-e07847f76355") : secret "calico-apiserver-certs" not found Oct 2 19:19:56.314845 kubelet[2063]: E1002 19:19:56.310662 2063 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:19:56.314845 kubelet[2063]: E1002 19:19:56.310697 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/0e3e935f-2dd4-4a13-8c73-84f98c64ae23-calico-apiserver-certs podName:0e3e935f-2dd4-4a13-8c73-84f98c64ae23 nodeName:}" failed. No retries permitted until 2023-10-02 19:19:56.810684446 +0000 UTC m=+53.069564504 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/0e3e935f-2dd4-4a13-8c73-84f98c64ae23-calico-apiserver-certs") pod "calico-apiserver-85fdcc9864-58q54" (UID: "0e3e935f-2dd4-4a13-8c73-84f98c64ae23") : secret "calico-apiserver-certs" not found Oct 2 19:19:56.283000 audit[3948]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.332341 kernel: audit: type=1325 audit(1696274396.283:1284): table=filter:115 family=2 entries=10 op=nft_register_rule pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.283000 audit[3948]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd3679de10 a2=0 a3=7ffd3679ddfc items=0 ppid=2249 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.368183 kernel: audit: type=1300 audit(1696274396.283:1284): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd3679de10 a2=0 a3=7ffd3679ddfc items=0 ppid=2249 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.388300 kernel: audit: type=1327 audit(1696274396.283:1284): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.352000 audit[3948]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.409178 kernel: audit: type=1325 audit(1696274396.352:1285): table=nat:116 family=2 entries=20 op=nft_register_rule pid=3948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:56.352000 audit[3948]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd3679de10 a2=0 a3=7ffd3679ddfc items=0 ppid=2249 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:56.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:56.986217 env[1131]: time="2023-10-02T19:19:56.985714533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fdcc9864-58q54,Uid:0e3e935f-2dd4-4a13-8c73-84f98c64ae23,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:19:57.018182 env[1131]: time="2023-10-02T19:19:57.016145127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fdcc9864-76csj,Uid:dda73f2b-f135-430b-84e2-e07847f76355,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:19:57.306315 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:19:57.306506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali58a70c8f35e: link becomes ready Oct 2 19:19:57.317351 systemd-networkd[1014]: cali58a70c8f35e: Link UP Oct 2 19:19:57.317363 systemd-networkd[1014]: cali58a70c8f35e: Gained carrier Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.141 [INFO][3955] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0 calico-apiserver-85fdcc9864- calico-apiserver 0e3e935f-2dd4-4a13-8c73-84f98c64ae23 827 0 2023-10-02 19:19:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85fdcc9864 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal calico-apiserver-85fdcc9864-58q54 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali58a70c8f35e [] []}} ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.142 [INFO][3955] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.225 [INFO][3979] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" HandleID="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.240 [INFO][3979] ipam_plugin.go 269: Auto assigning IP ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" HandleID="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000525040), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"calico-apiserver-85fdcc9864-58q54", "timestamp":"2023-10-02 19:19:57.225069707 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:57.341720 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:57.341720 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.240 [INFO][3979] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.245 [INFO][3979] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.251 [INFO][3979] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.257 [INFO][3979] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.259 [INFO][3979] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.267 [INFO][3979] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.268 [INFO][3979] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.270 [INFO][3979] ipam.go 1682: Creating new handle: k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.276 [INFO][3979] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.288 [INFO][3979] ipam.go 1216: Successfully claimed IPs: [192.168.85.5/26] block=192.168.85.0/26 handle="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.288 [INFO][3979] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.5/26] handle="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.341720 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:57.341720 env[1131]: 2023-10-02 19:19:57.288 [INFO][3979] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.5/26] IPv6=[] ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" HandleID="k8s-pod-network.f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.290 [INFO][3955] k8s.go 383: Populated endpoint ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0", GenerateName:"calico-apiserver-85fdcc9864-", Namespace:"calico-apiserver", SelfLink:"", UID:"0e3e935f-2dd4-4a13-8c73-84f98c64ae23", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fdcc9864", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-85fdcc9864-58q54", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali58a70c8f35e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.290 [INFO][3955] k8s.go 384: Calico CNI using IPs: [192.168.85.5/32] ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.290 [INFO][3955] dataplane_linux.go 68: Setting the host side veth name to cali58a70c8f35e ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.311 [INFO][3955] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.319 [INFO][3955] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0", GenerateName:"calico-apiserver-85fdcc9864-", Namespace:"calico-apiserver", SelfLink:"", UID:"0e3e935f-2dd4-4a13-8c73-84f98c64ae23", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fdcc9864", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a", Pod:"calico-apiserver-85fdcc9864-58q54", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali58a70c8f35e", MAC:"c2:97:d7:c4:69:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:57.343266 env[1131]: 2023-10-02 19:19:57.333 [INFO][3955] k8s.go 489: Wrote updated endpoint to datastore ContainerID="f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-58q54" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--58q54-eth0" Oct 2 19:19:57.400481 env[1131]: time="2023-10-02T19:19:57.400383278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:57.400701 env[1131]: time="2023-10-02T19:19:57.400507268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:57.400701 env[1131]: time="2023-10-02T19:19:57.400551204Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:57.400866 env[1131]: time="2023-10-02T19:19:57.400808651Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a pid=4018 runtime=io.containerd.runc.v2 Oct 2 19:19:57.430239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali88ce8f0a464: link becomes ready Oct 2 19:19:57.455524 systemd-networkd[1014]: cali88ce8f0a464: Link UP Oct 2 19:19:57.455535 systemd-networkd[1014]: cali88ce8f0a464: Gained carrier Oct 2 19:19:57.476806 systemd[1]: Started cri-containerd-f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a.scope. Oct 2 19:19:57.499398 systemd[1]: run-containerd-runc-k8s.io-f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a-runc.9n2u0Y.mount: Deactivated successfully. Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.190 [INFO][3966] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0 calico-apiserver-85fdcc9864- calico-apiserver dda73f2b-f135-430b-84e2-e07847f76355 831 0 2023-10-02 19:19:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85fdcc9864 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal calico-apiserver-85fdcc9864-76csj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali88ce8f0a464 [] []}} ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.190 [INFO][3966] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.303 [INFO][3986] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" HandleID="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.330 [INFO][3986] ipam_plugin.go 269: Auto assigning IP ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" HandleID="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d7e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", "pod":"calico-apiserver-85fdcc9864-76csj", "timestamp":"2023-10-02 19:19:57.302980579 +0000 UTC"}, Hostname:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:19:57.517935 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:19:57.517935 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.343 [INFO][3986] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal' Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.346 [INFO][3986] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.354 [INFO][3986] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.372 [INFO][3986] ipam.go 489: Trying affinity for 192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.380 [INFO][3986] ipam.go 155: Attempting to load block cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.385 [INFO][3986] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.85.0/26 host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.386 [INFO][3986] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.85.0/26 handle="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.391 [INFO][3986] ipam.go 1682: Creating new handle: k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30 Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.398 [INFO][3986] ipam.go 1203: Writing block in order to claim IPs block=192.168.85.0/26 handle="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.417 [INFO][3986] ipam.go 1216: Successfully claimed IPs: [192.168.85.6/26] block=192.168.85.0/26 handle="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.417 [INFO][3986] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.85.6/26] handle="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" host="ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal" Oct 2 19:19:57.517935 env[1131]: time="2023-10-02T19:19:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:19:57.517935 env[1131]: 2023-10-02 19:19:57.417 [INFO][3986] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.85.6/26] IPv6=[] ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" HandleID="k8s-pod-network.e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.420 [INFO][3966] k8s.go 383: Populated endpoint ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0", GenerateName:"calico-apiserver-85fdcc9864-", Namespace:"calico-apiserver", SelfLink:"", UID:"dda73f2b-f135-430b-84e2-e07847f76355", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fdcc9864", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-85fdcc9864-76csj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88ce8f0a464", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.420 [INFO][3966] k8s.go 384: Calico CNI using IPs: [192.168.85.6/32] ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.420 [INFO][3966] dataplane_linux.go 68: Setting the host side veth name to cali88ce8f0a464 ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.431 [INFO][3966] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.478 [INFO][3966] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0", GenerateName:"calico-apiserver-85fdcc9864-", Namespace:"calico-apiserver", SelfLink:"", UID:"dda73f2b-f135-430b-84e2-e07847f76355", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85fdcc9864", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30", Pod:"calico-apiserver-85fdcc9864-76csj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali88ce8f0a464", MAC:"5a:4d:68:46:50:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:19:57.519227 env[1131]: 2023-10-02 19:19:57.514 [INFO][3966] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30" Namespace="calico-apiserver" Pod="calico-apiserver-85fdcc9864-76csj" WorkloadEndpoint="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--apiserver--85fdcc9864--76csj-eth0" Oct 2 19:19:57.545528 env[1131]: time="2023-10-02T19:19:57.544905330Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:57.545528 env[1131]: time="2023-10-02T19:19:57.545008190Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:57.545528 env[1131]: time="2023-10-02T19:19:57.545049116Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:57.545528 env[1131]: time="2023-10-02T19:19:57.545268789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30 pid=4060 runtime=io.containerd.runc.v2 Oct 2 19:19:57.573805 systemd[1]: Started cri-containerd-e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30.scope. Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.610000 audit: BPF prog-id=183 op=LOAD Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4018 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638343466646463396364363438386234646461323563636566313766 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4018 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638343466646463396364363438386234646461323563636566313766 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit: BPF prog-id=184 op=LOAD Oct 2 19:19:57.611000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000257f0 items=0 ppid=4018 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638343466646463396364363438386234646461323563636566313766 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit: BPF prog-id=185 op=LOAD Oct 2 19:19:57.611000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025838 items=0 ppid=4018 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638343466646463396364363438386234646461323563636566313766 Oct 2 19:19:57.611000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:19:57.611000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.611000 audit: BPF prog-id=186 op=LOAD Oct 2 19:19:57.611000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025c48 items=0 ppid=4018 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638343466646463396364363438386234646461323563636566313766 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.616000 audit: BPF prog-id=187 op=LOAD Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4060 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653166386535376462343666353366393331643437323466666434 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4060 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653166386535376462343666353366393331643437323466666434 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit: BPF prog-id=188 op=LOAD Oct 2 19:19:57.617000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a5850 items=0 ppid=4060 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653166386535376462343666353366393331643437323466666434 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit: BPF prog-id=189 op=LOAD Oct 2 19:19:57.617000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a5898 items=0 ppid=4060 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653166386535376462343666353366393331643437323466666434 Oct 2 19:19:57.617000 audit: BPF prog-id=189 op=UNLOAD Oct 2 19:19:57.617000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:57.617000 audit: BPF prog-id=190 op=LOAD Oct 2 19:19:57.617000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a5ca8 items=0 ppid=4060 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534653166386535376462343666353366393331643437323466666434 Oct 2 19:19:57.631000 audit[4092]: NETFILTER_CFG table=filter:117 family=2 entries=59 op=nft_register_chain pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:57.631000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe3fac8050 a2=0 a3=7ffe3fac803c items=0 ppid=3095 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.631000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:57.684000 audit[4096]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_chain pid=4096 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:19:57.684000 audit[4096]: SYSCALL arch=c000003e syscall=46 success=yes exit=27348 a0=3 a1=7ffd0c8cca80 a2=0 a3=7ffd0c8cca6c items=0 ppid=3095 pid=4096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:57.684000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:19:57.697175 env[1131]: time="2023-10-02T19:19:57.696245483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fdcc9864-76csj,Uid:dda73f2b-f135-430b-84e2-e07847f76355,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e4e1f8e57db46f53f931d4724ffd431ca7122ecffa416c922df61fd036588b30\"" Oct 2 19:19:57.699707 env[1131]: time="2023-10-02T19:19:57.699668331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:57.717296 env[1131]: time="2023-10-02T19:19:57.717226688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85fdcc9864-58q54,Uid:0e3e935f-2dd4-4a13-8c73-84f98c64ae23,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f844fddc9cd6488b4dda25ccef17f4f495d54a0cebcdb566b558e4ea4e513d3a\"" Oct 2 19:19:57.878103 env[1131]: time="2023-10-02T19:19:57.878002549Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:57.879686 env[1131]: time="2023-10-02T19:19:57.879605628Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:57.880045 kubelet[2063]: E1002 19:19:57.880014 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:57.880555 kubelet[2063]: E1002 19:19:57.880072 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:57.880555 kubelet[2063]: E1002 19:19:57.880364 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ff6td,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-76csj_calico-apiserver(dda73f2b-f135-430b-84e2-e07847f76355): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:57.880555 kubelet[2063]: E1002 19:19:57.880432 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:19:57.881109 env[1131]: time="2023-10-02T19:19:57.881065246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:58.002635 env[1131]: time="2023-10-02T19:19:58.002547452Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:58.004251 env[1131]: time="2023-10-02T19:19:58.004181396Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:58.004546 kubelet[2063]: E1002 19:19:58.004516 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:58.004687 kubelet[2063]: E1002 19:19:58.004573 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:58.004764 kubelet[2063]: E1002 19:19:58.004711 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f7fh7,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-58q54_calico-apiserver(0e3e935f-2dd4-4a13-8c73-84f98c64ae23): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:58.004944 kubelet[2063]: E1002 19:19:58.004773 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:19:58.314312 kubelet[2063]: E1002 19:19:58.312896 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:19:58.314710 kubelet[2063]: E1002 19:19:58.314640 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:19:58.377000 audit[4116]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:58.377000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe8f38aec0 a2=0 a3=7ffe8f38aeac items=0 ppid=2249 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:58.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:58.379000 audit[4116]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:58.379000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe8f38aec0 a2=0 a3=7ffe8f38aeac items=0 ppid=2249 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:58.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:58.390000 audit[4118]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:58.390000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd0d69e0e0 a2=0 a3=7ffd0d69e0cc items=0 ppid=2249 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:58.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:58.392000 audit[4118]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:19:58.392000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd0d69e0e0 a2=0 a3=7ffd0d69e0cc items=0 ppid=2249 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:58.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:19:59.050527 systemd-networkd[1014]: cali88ce8f0a464: Gained IPv6LL Oct 2 19:19:59.114493 systemd-networkd[1014]: cali58a70c8f35e: Gained IPv6LL Oct 2 19:19:59.315817 kubelet[2063]: E1002 19:19:59.315374 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:19:59.315817 kubelet[2063]: E1002 19:19:59.315386 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:20:00.061000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.061000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.061000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e21920 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:00.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:00.061000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d31560 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:00.061000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:00.317000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.317000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0099d54d0 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.317000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:00.317000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.317000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0046e9280 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.317000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:00.319000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.319000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0099d5560 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:00.335000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.335000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0046e92a0 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:00.335000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.335000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0034e50e0 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.335000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:00.338000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:00.338000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0034e5260 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:20:00.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:20:01.022115 env[1131]: time="2023-10-02T19:20:01.021988395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:20:01.149014 env[1131]: time="2023-10-02T19:20:01.148936608Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:01.150516 env[1131]: time="2023-10-02T19:20:01.150445815Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:01.150794 kubelet[2063]: E1002 19:20:01.150743 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:01.150794 kubelet[2063]: E1002 19:20:01.150798 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:01.151353 kubelet[2063]: E1002 19:20:01.150922 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:01.152452 env[1131]: time="2023-10-02T19:20:01.152401426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:20:01.277621 env[1131]: time="2023-10-02T19:20:01.276847272Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:01.278519 env[1131]: time="2023-10-02T19:20:01.278444859Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:01.278919 kubelet[2063]: E1002 19:20:01.278878 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:01.279057 kubelet[2063]: E1002 19:20:01.278942 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:01.279714 kubelet[2063]: E1002 19:20:01.279680 2063 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:01.279947 kubelet[2063]: E1002 19:20:01.279774 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:20:03.191210 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.y2k7Ij.mount: Deactivated successfully. Oct 2 19:20:03.246119 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.UTNogl.mount: Deactivated successfully. Oct 2 19:20:03.991902 env[1131]: time="2023-10-02T19:20:03.991848546Z" level=info msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.044 [WARNING][4200] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c", Pod:"csi-node-driver-htm56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ddc0a5698a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.045 [INFO][4200] k8s.go 576: Cleaning up netns ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.045 [INFO][4200] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" iface="eth0" netns="" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.045 [INFO][4200] k8s.go 583: Releasing IP address(es) ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.045 [INFO][4200] utils.go 196: Calico CNI releasing IP address ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.077 [INFO][4207] ipam_plugin.go 416: Releasing address using handleID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.089219 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.089219 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.084 [WARNING][4207] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.084 [INFO][4207] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.089219 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.089219 env[1131]: 2023-10-02 19:20:04.087 [INFO][4200] k8s.go 589: Teardown processing complete. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.090133 env[1131]: time="2023-10-02T19:20:04.089267702Z" level=info msg="TearDown network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" successfully" Oct 2 19:20:04.090133 env[1131]: time="2023-10-02T19:20:04.089309948Z" level=info msg="StopPodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" returns successfully" Oct 2 19:20:04.091090 env[1131]: time="2023-10-02T19:20:04.091041235Z" level=info msg="RemovePodSandbox for \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" Oct 2 19:20:04.091284 env[1131]: time="2023-10-02T19:20:04.091097811Z" level=info msg="Forcibly stopping sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\"" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.140 [WARNING][4226] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"c012e2b8d65875eddb9f9a0c013925a772296fa34bb43d57b18402a45f29b80c", Pod:"csi-node-driver-htm56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.85.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8ddc0a5698a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.141 [INFO][4226] k8s.go 576: Cleaning up netns ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.141 [INFO][4226] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" iface="eth0" netns="" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.141 [INFO][4226] k8s.go 583: Releasing IP address(es) ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.141 [INFO][4226] utils.go 196: Calico CNI releasing IP address ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.171 [INFO][4232] ipam_plugin.go 416: Releasing address using handleID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.188505 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.188505 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.179 [WARNING][4232] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.179 [INFO][4232] ipam_plugin.go 444: Releasing address using workloadID ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" HandleID="k8s-pod-network.0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-csi--node--driver--htm56-eth0" Oct 2 19:20:04.188505 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.188505 env[1131]: 2023-10-02 19:20:04.187 [INFO][4226] k8s.go 589: Teardown processing complete. ContainerID="0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286" Oct 2 19:20:04.188505 env[1131]: time="2023-10-02T19:20:04.188479790Z" level=info msg="TearDown network for sandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" successfully" Oct 2 19:20:04.193641 env[1131]: time="2023-10-02T19:20:04.193588774Z" level=info msg="RemovePodSandbox \"0ffa37476ba7a335ad9c6750b13889629da6b85633ec0c57411ed36b4d05a286\" returns successfully" Oct 2 19:20:04.194269 env[1131]: time="2023-10-02T19:20:04.194231129Z" level=info msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.243 [WARNING][4250] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"15d82d10-716e-4228-a123-68bf708ecb9c", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30", Pod:"coredns-5dd5756b68-mv9wl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0eb87eb136e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.244 [INFO][4250] k8s.go 576: Cleaning up netns ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.244 [INFO][4250] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" iface="eth0" netns="" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.244 [INFO][4250] k8s.go 583: Releasing IP address(es) ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.244 [INFO][4250] utils.go 196: Calico CNI releasing IP address ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.269 [INFO][4257] ipam_plugin.go 416: Releasing address using handleID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.282393 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.282393 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.276 [WARNING][4257] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.276 [INFO][4257] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.282393 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.282393 env[1131]: 2023-10-02 19:20:04.279 [INFO][4250] k8s.go 589: Teardown processing complete. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.282393 env[1131]: time="2023-10-02T19:20:04.280981284Z" level=info msg="TearDown network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" successfully" Oct 2 19:20:04.282393 env[1131]: time="2023-10-02T19:20:04.281027920Z" level=info msg="StopPodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" returns successfully" Oct 2 19:20:04.283507 env[1131]: time="2023-10-02T19:20:04.283468474Z" level=info msg="RemovePodSandbox for \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" Oct 2 19:20:04.283723 env[1131]: time="2023-10-02T19:20:04.283658769Z" level=info msg="Forcibly stopping sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\"" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.327 [WARNING][4275] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"15d82d10-716e-4228-a123-68bf708ecb9c", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"6003b86f0e33d04ee04624aa11126f2d122ade243f40f3f0125934efb7b2cf30", Pod:"coredns-5dd5756b68-mv9wl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0eb87eb136e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.328 [INFO][4275] k8s.go 576: Cleaning up netns ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.328 [INFO][4275] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" iface="eth0" netns="" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.328 [INFO][4275] k8s.go 583: Releasing IP address(es) ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.328 [INFO][4275] utils.go 196: Calico CNI releasing IP address ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.386 [INFO][4281] ipam_plugin.go 416: Releasing address using handleID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.397634 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.397634 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.393 [WARNING][4281] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.393 [INFO][4281] ipam_plugin.go 444: Releasing address using workloadID ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" HandleID="k8s-pod-network.cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--mv9wl-eth0" Oct 2 19:20:04.397634 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.397634 env[1131]: 2023-10-02 19:20:04.396 [INFO][4275] k8s.go 589: Teardown processing complete. ContainerID="cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce" Oct 2 19:20:04.398515 env[1131]: time="2023-10-02T19:20:04.397677597Z" level=info msg="TearDown network for sandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" successfully" Oct 2 19:20:04.402869 env[1131]: time="2023-10-02T19:20:04.402812842Z" level=info msg="RemovePodSandbox \"cca5ecc32cf72b41d60bcad058195dea24e769162675e6659957b68ac0edc0ce\" returns successfully" Oct 2 19:20:04.403588 env[1131]: time="2023-10-02T19:20:04.403548877Z" level=info msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.450 [WARNING][4300] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"18cf6ee5-1e90-4777-98f0-74942dcf3521", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b", Pod:"calico-kube-controllers-74b9887bb6-t7dgc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f45b69e893", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.450 [INFO][4300] k8s.go 576: Cleaning up netns ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.451 [INFO][4300] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" iface="eth0" netns="" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.451 [INFO][4300] k8s.go 583: Releasing IP address(es) ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.451 [INFO][4300] utils.go 196: Calico CNI releasing IP address ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.480 [INFO][4306] ipam_plugin.go 416: Releasing address using handleID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.491647 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.491647 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.487 [WARNING][4306] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.487 [INFO][4306] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.491647 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.491647 env[1131]: 2023-10-02 19:20:04.490 [INFO][4300] k8s.go 589: Teardown processing complete. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.492497 env[1131]: time="2023-10-02T19:20:04.491677121Z" level=info msg="TearDown network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" successfully" Oct 2 19:20:04.492497 env[1131]: time="2023-10-02T19:20:04.491723547Z" level=info msg="StopPodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" returns successfully" Oct 2 19:20:04.492698 env[1131]: time="2023-10-02T19:20:04.492661422Z" level=info msg="RemovePodSandbox for \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" Oct 2 19:20:04.492804 env[1131]: time="2023-10-02T19:20:04.492740959Z" level=info msg="Forcibly stopping sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\"" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.537 [WARNING][4324] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"18cf6ee5-1e90-4777-98f0-74942dcf3521", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"619abf2febab777e8dac8f4f9110db4030c16c5abd19b6218c6815dffa2c2a6b", Pod:"calico-kube-controllers-74b9887bb6-t7dgc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali4f45b69e893", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.537 [INFO][4324] k8s.go 576: Cleaning up netns ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.537 [INFO][4324] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" iface="eth0" netns="" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.537 [INFO][4324] k8s.go 583: Releasing IP address(es) ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.537 [INFO][4324] utils.go 196: Calico CNI releasing IP address ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.564 [INFO][4330] ipam_plugin.go 416: Releasing address using handleID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.578878 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.578878 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.571 [WARNING][4330] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.571 [INFO][4330] ipam_plugin.go 444: Releasing address using workloadID ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" HandleID="k8s-pod-network.dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-calico--kube--controllers--74b9887bb6--t7dgc-eth0" Oct 2 19:20:04.578878 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.578878 env[1131]: 2023-10-02 19:20:04.575 [INFO][4324] k8s.go 589: Teardown processing complete. ContainerID="dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784" Oct 2 19:20:04.578878 env[1131]: time="2023-10-02T19:20:04.576525754Z" level=info msg="TearDown network for sandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" successfully" Oct 2 19:20:04.582038 env[1131]: time="2023-10-02T19:20:04.581989773Z" level=info msg="RemovePodSandbox \"dc125d542b94c597f2752aff6d708bb3d99784ad175fc8e723dd33e0834fe784\" returns successfully" Oct 2 19:20:04.582933 env[1131]: time="2023-10-02T19:20:04.582878071Z" level=info msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.627 [WARNING][4348] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9", Pod:"coredns-5dd5756b68-q27g4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27723702b67", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.627 [INFO][4348] k8s.go 576: Cleaning up netns ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.627 [INFO][4348] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" iface="eth0" netns="" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.627 [INFO][4348] k8s.go 583: Releasing IP address(es) ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.628 [INFO][4348] utils.go 196: Calico CNI releasing IP address ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.665 [INFO][4355] ipam_plugin.go 416: Releasing address using handleID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.678128 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.678128 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.673 [WARNING][4355] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.673 [INFO][4355] ipam_plugin.go 444: Releasing address using workloadID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.678128 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.678128 env[1131]: 2023-10-02 19:20:04.676 [INFO][4348] k8s.go 589: Teardown processing complete. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.679563 env[1131]: time="2023-10-02T19:20:04.678182981Z" level=info msg="TearDown network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" successfully" Oct 2 19:20:04.679563 env[1131]: time="2023-10-02T19:20:04.678225940Z" level=info msg="StopPodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" returns successfully" Oct 2 19:20:04.679563 env[1131]: time="2023-10-02T19:20:04.678806875Z" level=info msg="RemovePodSandbox for \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" Oct 2 19:20:04.679563 env[1131]: time="2023-10-02T19:20:04.678851373Z" level=info msg="Forcibly stopping sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\"" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.741 [WARNING][4374] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"19e4ffc4-3245-4f79-91b7-ac0a6ad7ead5", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 19, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-aa0bd44d1d51872e3e60.c.flatcar-212911.internal", ContainerID:"ba8e2d89c025ea7226ccea80ea23f989d004f06ec2be632b2ebca501f0299db9", Pod:"coredns-5dd5756b68-q27g4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali27723702b67", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.741 [INFO][4374] k8s.go 576: Cleaning up netns ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.742 [INFO][4374] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" iface="eth0" netns="" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.742 [INFO][4374] k8s.go 583: Releasing IP address(es) ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.742 [INFO][4374] utils.go 196: Calico CNI releasing IP address ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.772 [INFO][4380] ipam_plugin.go 416: Releasing address using handleID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.784356 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:04.784356 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.779 [WARNING][4380] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.779 [INFO][4380] ipam_plugin.go 444: Releasing address using workloadID ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" HandleID="k8s-pod-network.369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Workload="ci--3510--3--0--aa0bd44d1d51872e3e60.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--q27g4-eth0" Oct 2 19:20:04.784356 env[1131]: time="2023-10-02T19:20:04Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:04.784356 env[1131]: 2023-10-02 19:20:04.783 [INFO][4374] k8s.go 589: Teardown processing complete. ContainerID="369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363" Oct 2 19:20:04.785399 env[1131]: time="2023-10-02T19:20:04.785313649Z" level=info msg="TearDown network for sandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" successfully" Oct 2 19:20:04.791103 env[1131]: time="2023-10-02T19:20:04.791023257Z" level=info msg="RemovePodSandbox \"369ebc766d0153c9e36bf9d80bb467a9b3057f7884021a3b962a960a1347f363\" returns successfully" Oct 2 19:20:11.022094 env[1131]: time="2023-10-02T19:20:11.021652529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:11.150345 env[1131]: time="2023-10-02T19:20:11.150173362Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:11.152426 env[1131]: time="2023-10-02T19:20:11.152359857Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:11.152786 kubelet[2063]: E1002 19:20:11.152751 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:11.153347 kubelet[2063]: E1002 19:20:11.152813 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:11.153347 kubelet[2063]: E1002 19:20:11.153113 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ff6td,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-76csj_calico-apiserver(dda73f2b-f135-430b-84e2-e07847f76355): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:11.153347 kubelet[2063]: E1002 19:20:11.153210 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:20:11.154606 env[1131]: time="2023-10-02T19:20:11.154236246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:11.277919 env[1131]: time="2023-10-02T19:20:11.277718065Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:11.279548 env[1131]: time="2023-10-02T19:20:11.279471527Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:11.280057 kubelet[2063]: E1002 19:20:11.279999 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:11.280057 kubelet[2063]: E1002 19:20:11.280054 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:11.280295 kubelet[2063]: E1002 19:20:11.280222 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f7fh7,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-58q54_calico-apiserver(0e3e935f-2dd4-4a13-8c73-84f98c64ae23): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:11.280295 kubelet[2063]: E1002 19:20:11.280284 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:20:13.193823 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.2zkgHR.mount: Deactivated successfully. Oct 2 19:20:13.242480 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.sLMcyn.mount: Deactivated successfully. Oct 2 19:20:14.024790 kubelet[2063]: E1002 19:20:14.024757 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:20:15.354946 kernel: kauditd_printk_skb: 158 callbacks suppressed Oct 2 19:20:15.355208 kernel: audit: type=1400 audit(1696274415.347:1336): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.347000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.347000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.409671 kernel: audit: type=1400 audit(1696274415.347:1337): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.409875 kernel: audit: type=1300 audit(1696274415.347:1336): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c45800 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.347000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c45800 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.474298 kernel: audit: type=1327 audit(1696274415.347:1336): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.474489 kernel: audit: type=1400 audit(1696274415.348:1338): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.348000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.348000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c45820 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.535841 kernel: audit: type=1300 audit(1696274415.348:1338): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c45820 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.536037 kernel: audit: type=1327 audit(1696274415.348:1338): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.348000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.347000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d82620 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.600582 kernel: audit: type=1300 audit(1696274415.347:1337): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d82620 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.600776 kernel: audit: type=1327 audit(1696274415.347:1337): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.347000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:15.369000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.655649 kernel: audit: type=1400 audit(1696274415.369:1339): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:15.369000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012843e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:20:15.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:23.021795 kubelet[2063]: E1002 19:20:23.021758 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:20:23.193466 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.cqSb6D.mount: Deactivated successfully. Oct 2 19:20:23.285419 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.LPsVuo.mount: Deactivated successfully. Oct 2 19:20:25.021823 kubelet[2063]: E1002 19:20:25.021785 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:20:25.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-34.172.82.151:42140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.734536 systemd[1]: Started sshd@9-10.128.0.6:22-34.172.82.151:42140.service. Oct 2 19:20:25.741753 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:20:25.741905 kernel: audit: type=1130 audit(1696274425.734:1340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-34.172.82.151:42140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.832240 sshd[4526]: Invalid user es from 34.172.82.151 port 42140 Oct 2 19:20:25.840000 audit[4526]: USER_AUTH pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="es" exe="/usr/sbin/sshd" hostname=34.172.82.151 addr=34.172.82.151 terminal=ssh res=failed' Oct 2 19:20:25.840707 sshd[4526]: Failed password for invalid user es from 34.172.82.151 port 42140 ssh2 Oct 2 19:20:25.865198 kernel: audit: type=1100 audit(1696274425.840:1341): pid=4526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="es" exe="/usr/sbin/sshd" hostname=34.172.82.151 addr=34.172.82.151 terminal=ssh res=failed' Oct 2 19:20:25.969295 sshd[4526]: Received disconnect from 34.172.82.151 port 42140:11: Bye Bye [preauth] Oct 2 19:20:25.969295 sshd[4526]: Disconnected from invalid user es 34.172.82.151 port 42140 [preauth] Oct 2 19:20:25.971222 systemd[1]: sshd@9-10.128.0.6:22-34.172.82.151:42140.service: Deactivated successfully. Oct 2 19:20:25.997301 kernel: audit: type=1131 audit(1696274425.971:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-34.172.82.151:42140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:25.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.6:22-34.172.82.151:42140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:26.028997 kubelet[2063]: E1002 19:20:26.028959 2063 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:20:26.031063 env[1131]: time="2023-10-02T19:20:26.030672469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:20:26.171493 env[1131]: time="2023-10-02T19:20:26.171392159Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:26.173524 env[1131]: time="2023-10-02T19:20:26.173455076Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:26.174008 kubelet[2063]: E1002 19:20:26.173971 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:26.174188 kubelet[2063]: E1002 19:20:26.174032 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:26.174277 kubelet[2063]: E1002 19:20:26.174187 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:26.175469 env[1131]: time="2023-10-02T19:20:26.175431577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:20:26.301383 env[1131]: time="2023-10-02T19:20:26.301199758Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:26.303235 env[1131]: time="2023-10-02T19:20:26.303135404Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:26.303505 kubelet[2063]: E1002 19:20:26.303471 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:26.303633 kubelet[2063]: E1002 19:20:26.303533 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:26.303695 kubelet[2063]: E1002 19:20:26.303653 2063 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:26.303873 kubelet[2063]: E1002 19:20:26.303731 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:20:27.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-104.28.238.182:32292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:27.216507 systemd[1]: Started sshd@10-10.128.0.6:22-104.28.238.182:32292.service. Oct 2 19:20:27.242257 kernel: audit: type=1130 audit(1696274427.215:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-104.28.238.182:32292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:28.235668 sshd[4530]: Invalid user testt from 104.28.238.182 port 32292 Oct 2 19:20:28.242000 audit[4530]: USER_AUTH pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testt" exe="/usr/sbin/sshd" hostname=104.28.238.182 addr=104.28.238.182 terminal=ssh res=failed' Oct 2 19:20:28.243996 sshd[4530]: Failed password for invalid user testt from 104.28.238.182 port 32292 ssh2 Oct 2 19:20:28.269229 kernel: audit: type=1100 audit(1696274428.242:1344): pid=4530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testt" exe="/usr/sbin/sshd" hostname=104.28.238.182 addr=104.28.238.182 terminal=ssh res=failed' Oct 2 19:20:28.427226 sshd[4530]: Received disconnect from 104.28.238.182 port 32292:11: Bye Bye [preauth] Oct 2 19:20:28.427226 sshd[4530]: Disconnected from invalid user testt 104.28.238.182 port 32292 [preauth] Oct 2 19:20:28.429022 systemd[1]: sshd@10-10.128.0.6:22-104.28.238.182:32292.service: Deactivated successfully. Oct 2 19:20:28.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-104.28.238.182:32292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:28.455243 kernel: audit: type=1131 audit(1696274428.428:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.6:22-104.28.238.182:32292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:36.022733 env[1131]: time="2023-10-02T19:20:36.022664044Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:36.163178 env[1131]: time="2023-10-02T19:20:36.163089090Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:36.165252 env[1131]: time="2023-10-02T19:20:36.165175314Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:36.165648 kubelet[2063]: E1002 19:20:36.165615 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:36.166222 kubelet[2063]: E1002 19:20:36.165712 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:36.166222 kubelet[2063]: E1002 19:20:36.165924 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ff6td,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-76csj_calico-apiserver(dda73f2b-f135-430b-84e2-e07847f76355): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:36.166222 kubelet[2063]: E1002 19:20:36.166019 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:20:37.022376 env[1131]: time="2023-10-02T19:20:37.022298238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:37.152008 env[1131]: time="2023-10-02T19:20:37.151917260Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:37.154173 env[1131]: time="2023-10-02T19:20:37.154089086Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:37.154583 kubelet[2063]: E1002 19:20:37.154551 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:37.154736 kubelet[2063]: E1002 19:20:37.154606 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:37.154821 kubelet[2063]: E1002 19:20:37.154753 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f7fh7,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-58q54_calico-apiserver(0e3e935f-2dd4-4a13-8c73-84f98c64ae23): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:37.154821 kubelet[2063]: E1002 19:20:37.154817 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:20:40.022631 kubelet[2063]: E1002 19:20:40.022436 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:20:48.023071 kubelet[2063]: E1002 19:20:48.023023 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:20:50.023027 kubelet[2063]: E1002 19:20:50.022977 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:20:50.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.6:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.552115 systemd[1]: Started sshd@11-10.128.0.6:22-147.75.109.163:51684.service. Oct 2 19:20:50.577198 kernel: audit: type=1130 audit(1696274450.551:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.6:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:50.850000 audit[4677]: USER_ACCT pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.853700 sshd[4677]: Accepted publickey for core from 147.75.109.163 port 51684 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:20:50.883839 kernel: audit: type=1101 audit(1696274450.850:1347): pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.883000 audit[4677]: CRED_ACQ pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.885946 sshd[4677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:20:50.900047 systemd[1]: Started session-8.scope. Oct 2 19:20:50.902113 systemd-logind[1119]: New session 8 of user core. Oct 2 19:20:50.910444 kernel: audit: type=1103 audit(1696274450.883:1348): pid=4677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.883000 audit[4677]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf1f0c60 a2=3 a3=0 items=0 ppid=1 pid=4677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:50.958090 kernel: audit: type=1006 audit(1696274450.883:1349): pid=4677 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:20:50.958349 kernel: audit: type=1300 audit(1696274450.883:1349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf1f0c60 a2=3 a3=0 items=0 ppid=1 pid=4677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:50.958413 kernel: audit: type=1327 audit(1696274450.883:1349): proctitle=737368643A20636F7265205B707269765D Oct 2 19:20:50.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:20:50.911000 audit[4677]: USER_START pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.005212 kernel: audit: type=1105 audit(1696274450.911:1350): pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.005393 kernel: audit: type=1103 audit(1696274450.911:1351): pid=4679 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:50.911000 audit[4679]: CRED_ACQ pid=4679 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.023514 kubelet[2063]: E1002 19:20:51.023483 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:20:51.228756 sshd[4677]: pam_unix(sshd:session): session closed for user core Oct 2 19:20:51.231000 audit[4677]: USER_END pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.244758 systemd[1]: sshd@11-10.128.0.6:22-147.75.109.163:51684.service: Deactivated successfully. Oct 2 19:20:51.246050 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:20:51.248236 systemd-logind[1119]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:20:51.250085 systemd-logind[1119]: Removed session 8. Oct 2 19:20:51.231000 audit[4677]: CRED_DISP pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.289229 kernel: audit: type=1106 audit(1696274451.231:1352): pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.289403 kernel: audit: type=1104 audit(1696274451.231:1353): pid=4677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:20:51.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.6:22-147.75.109.163:51684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:53.196460 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.z5PK9M.mount: Deactivated successfully. Oct 2 19:20:53.237841 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.DRt1B0.mount: Deactivated successfully. Oct 2 19:21:00.063000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.069052 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:21:00.069245 kernel: audit: type=1400 audit(1696274460.063:1355): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.063000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.123498 kernel: audit: type=1400 audit(1696274460.063:1356): avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.123683 kernel: audit: type=1300 audit(1696274460.063:1355): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014e5b00 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:00.063000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014e5b00 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:00.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:00.187825 kernel: audit: type=1327 audit(1696274460.063:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:00.188012 kernel: audit: type=1300 audit(1696274460.063:1356): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00276e4e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:00.063000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00276e4e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:00.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:00.252049 kernel: audit: type=1327 audit(1696274460.063:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:00.319000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.319000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.374285 kernel: audit: type=1400 audit(1696274460.319:1358): avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.374476 kernel: audit: type=1400 audit(1696274460.319:1357): avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.319000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0137e9b40 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.408171 kernel: audit: type=1300 audit(1696274460.319:1358): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0137e9b40 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.408353 kernel: audit: type=1327 audit(1696274460.319:1358): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.319000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.319000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00c56f7d0 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.319000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01399fb00 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.334000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.334000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c01399fb60 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.334000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.334000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0137e9c60 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:00.339000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:00.339000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00c56f950 a2=fc6 a3=0 items=0 ppid=1789 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c62,c667 key=(null) Oct 2 19:21:00.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E36002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Oct 2 19:21:01.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.6:22-147.75.109.163:33966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:01.276825 systemd[1]: Started sshd@12-10.128.0.6:22-147.75.109.163:33966.service. Oct 2 19:21:01.570000 audit[4752]: USER_ACCT pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.571405 sshd[4752]: Accepted publickey for core from 147.75.109.163 port 33966 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:21:01.572000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.572000 audit[4752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc4417110 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:01.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:01.573671 sshd[4752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:21:01.580106 systemd-logind[1119]: New session 9 of user core. Oct 2 19:21:01.581402 systemd[1]: Started session-9.scope. Oct 2 19:21:01.590000 audit[4752]: USER_START pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.592000 audit[4754]: CRED_ACQ pid=4754 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.860083 sshd[4752]: pam_unix(sshd:session): session closed for user core Oct 2 19:21:01.862000 audit[4752]: USER_END pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.862000 audit[4752]: CRED_DISP pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:01.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.6:22-147.75.109.163:33966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:01.864643 systemd[1]: sshd@12-10.128.0.6:22-147.75.109.163:33966.service: Deactivated successfully. Oct 2 19:21:01.865958 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:21:01.867745 systemd-logind[1119]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:21:01.869980 systemd-logind[1119]: Removed session 9. Oct 2 19:21:02.024809 kubelet[2063]: E1002 19:21:02.024764 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:21:02.025730 kubelet[2063]: E1002 19:21:02.025689 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:21:03.190473 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.kVa0oZ.mount: Deactivated successfully. Oct 2 19:21:03.239818 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.gaS3OV.mount: Deactivated successfully. Oct 2 19:21:05.021825 kubelet[2063]: E1002 19:21:05.021791 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:21:11.916711 systemd[1]: Started sshd@13-10.128.0.6:22-147.75.109.163:58592.service. Oct 2 19:21:11.936212 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:21:11.936413 kernel: audit: type=1130 audit(1696274471.915:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-147.75.109.163:58592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:11.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-147.75.109.163:58592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:12.205000 audit[4836]: USER_ACCT pid=4836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.236732 sshd[4836]: Accepted publickey for core from 147.75.109.163 port 58592 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:21:12.237211 kernel: audit: type=1101 audit(1696274472.205:1373): pid=4836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.237469 sshd[4836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:21:12.246553 systemd[1]: Started session-10.scope. Oct 2 19:21:12.247587 systemd-logind[1119]: New session 10 of user core. Oct 2 19:21:12.235000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.294176 kernel: audit: type=1103 audit(1696274472.235:1374): pid=4836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.294367 kernel: audit: type=1006 audit(1696274472.235:1375): pid=4836 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:21:12.235000 audit[4836]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ce309c0 a2=3 a3=0 items=0 ppid=1 pid=4836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.295204 kernel: audit: type=1300 audit(1696274472.235:1375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ce309c0 a2=3 a3=0 items=0 ppid=1 pid=4836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:12.323325 kernel: audit: type=1327 audit(1696274472.235:1375): proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:12.263000 audit[4836]: USER_START pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.366105 kernel: audit: type=1105 audit(1696274472.263:1376): pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.267000 audit[4839]: CRED_ACQ pid=4839 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.391386 kernel: audit: type=1103 audit(1696274472.267:1377): pid=4839 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.532368 sshd[4836]: pam_unix(sshd:session): session closed for user core Oct 2 19:21:12.533000 audit[4836]: USER_END pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.533000 audit[4836]: CRED_DISP pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.570648 systemd[1]: sshd@13-10.128.0.6:22-147.75.109.163:58592.service: Deactivated successfully. Oct 2 19:21:12.571871 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:21:12.574264 systemd-logind[1119]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:21:12.575875 systemd-logind[1119]: Removed session 10. Oct 2 19:21:12.593483 kernel: audit: type=1106 audit(1696274472.533:1378): pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.593644 kernel: audit: type=1104 audit(1696274472.533:1379): pid=4836 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.6:22-147.75.109.163:58592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:12.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.6:22-147.75.109.163:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:12.601246 systemd[1]: Started sshd@14-10.128.0.6:22-147.75.109.163:45554.service. Oct 2 19:21:12.894000 audit[4850]: USER_ACCT pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.896132 sshd[4850]: Accepted publickey for core from 147.75.109.163 port 45554 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:21:12.896000 audit[4850]: CRED_ACQ pid=4850 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.896000 audit[4850]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9a94ad20 a2=3 a3=0 items=0 ppid=1 pid=4850 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:12.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:12.898685 sshd[4850]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:21:12.906281 systemd-logind[1119]: New session 11 of user core. Oct 2 19:21:12.907318 systemd[1]: Started session-11.scope. Oct 2 19:21:12.915000 audit[4850]: USER_START pid=4850 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:12.918000 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.021985 env[1131]: time="2023-10-02T19:21:13.021928502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:21:13.160070 env[1131]: time="2023-10-02T19:21:13.159885865Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:13.161754 env[1131]: time="2023-10-02T19:21:13.161685722Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:13.162243 kubelet[2063]: E1002 19:21:13.162207 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:13.162738 kubelet[2063]: E1002 19:21:13.162288 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:13.162738 kubelet[2063]: E1002 19:21:13.162493 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:13.164165 env[1131]: time="2023-10-02T19:21:13.164084216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:21:13.287686 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.2C0TAX.mount: Deactivated successfully. Oct 2 19:21:13.293520 env[1131]: time="2023-10-02T19:21:13.293430638Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:13.301659 env[1131]: time="2023-10-02T19:21:13.301249604Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:13.301860 kubelet[2063]: E1002 19:21:13.301671 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:13.301860 kubelet[2063]: E1002 19:21:13.301718 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:13.302273 kubelet[2063]: E1002 19:21:13.302234 2063 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fh8c2,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-htm56_calico-system(337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:13.302499 kubelet[2063]: E1002 19:21:13.302331 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:21:13.570236 sshd[4850]: pam_unix(sshd:session): session closed for user core Oct 2 19:21:13.572000 audit[4850]: USER_END pid=4850 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.572000 audit[4850]: CRED_DISP pid=4850 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.6:22-147.75.109.163:45554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:13.575600 systemd[1]: sshd@14-10.128.0.6:22-147.75.109.163:45554.service: Deactivated successfully. Oct 2 19:21:13.576633 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:21:13.578496 systemd-logind[1119]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:21:13.579803 systemd-logind[1119]: Removed session 11. Oct 2 19:21:13.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.6:22-147.75.109.163:45558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:13.617373 systemd[1]: Started sshd@15-10.128.0.6:22-147.75.109.163:45558.service. Oct 2 19:21:13.908000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.910367 sshd[4923]: Accepted publickey for core from 147.75.109.163 port 45558 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:21:13.911000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.911000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa1e1fb20 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:13.911000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:13.913503 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:21:13.922289 systemd-logind[1119]: New session 12 of user core. Oct 2 19:21:13.923485 systemd[1]: Started session-12.scope. Oct 2 19:21:13.933000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:13.936000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:14.196787 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.RLwOeI.mount: Deactivated successfully. Oct 2 19:21:14.201303 sshd[4923]: pam_unix(sshd:session): session closed for user core Oct 2 19:21:14.202000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:14.202000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:14.205662 systemd[1]: sshd@15-10.128.0.6:22-147.75.109.163:45558.service: Deactivated successfully. Oct 2 19:21:14.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.6:22-147.75.109.163:45558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:14.207018 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:21:14.208113 systemd-logind[1119]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:21:14.209656 systemd-logind[1119]: Removed session 12. Oct 2 19:21:15.021235 kubelet[2063]: E1002 19:21:15.021185 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:21:15.349000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:15.349000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:15.349000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013679e0 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:15.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:15.349000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009cff20 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:15.349000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:15.355000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:15.355000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001367d40 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:15.355000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:15.372000 audit[1898]: AVC avc: denied { watch } for pid=1898 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:15.372000 audit[1898]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00024ae20 a2=fc6 a3=0 items=0 ppid=1762 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c182,c380 key=(null) Oct 2 19:21:15.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:16.022281 kubelet[2063]: E1002 19:21:16.022242 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23" Oct 2 19:21:23.192979 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.okczYp.mount: Deactivated successfully. Oct 2 19:21:23.245379 systemd[1]: run-containerd-runc-k8s.io-3b69ed6051c75ff1bf1605080e7d4bc4e8dc12c0533d74ccaedb78d4e574e937-runc.1dd29s.mount: Deactivated successfully. Oct 2 19:21:24.187358 systemd[1]: run-containerd-runc-k8s.io-1349a82c5122ed6f46875085874dd8b69618855ce9834e326f78edcd22c443f6-runc.bJE9v4.mount: Deactivated successfully. Oct 2 19:21:24.251913 systemd[1]: Started sshd@16-10.128.0.6:22-147.75.109.163:55666.service. Oct 2 19:21:24.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.6:22-147.75.109.163:55666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:24.268671 kernel: kauditd_printk_skb: 35 callbacks suppressed Oct 2 19:21:24.268842 kernel: audit: type=1130 audit(1696274484.251:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.6:22-147.75.109.163:55666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:24.549000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.581109 sshd[5014]: Accepted publickey for core from 147.75.109.163 port 55666 ssh2: RSA SHA256:uTzGMmjknFouvM49fa8EYeiBAz5hxIwhUzRriwXlGUg Oct 2 19:21:24.581628 kernel: audit: type=1101 audit(1696274484.549:1404): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.581901 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:21:24.579000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.594541 systemd[1]: Started session-13.scope. Oct 2 19:21:24.596654 systemd-logind[1119]: New session 13 of user core. Oct 2 19:21:24.626887 kernel: audit: type=1103 audit(1696274484.579:1405): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.627051 kernel: audit: type=1006 audit(1696274484.580:1406): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:21:24.627101 kernel: audit: type=1300 audit(1696274484.580:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbf065360 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:24.580000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbf065360 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:21:24.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:24.666231 kernel: audit: type=1327 audit(1696274484.580:1406): proctitle=737368643A20636F7265205B707269765D Oct 2 19:21:24.604000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.608000 audit[5016]: CRED_ACQ pid=5016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.724489 kernel: audit: type=1105 audit(1696274484.604:1407): pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.724695 kernel: audit: type=1103 audit(1696274484.608:1408): pid=5016 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.862257 sshd[5014]: pam_unix(sshd:session): session closed for user core Oct 2 19:21:24.863000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.897441 kernel: audit: type=1106 audit(1696274484.863:1409): pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.897578 kernel: audit: type=1104 audit(1696274484.863:1410): pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.863000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 2 19:21:24.900192 systemd[1]: sshd@16-10.128.0.6:22-147.75.109.163:55666.service: Deactivated successfully. Oct 2 19:21:24.901582 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:21:24.903905 systemd-logind[1119]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:21:24.905662 systemd-logind[1119]: Removed session 13. Oct 2 19:21:24.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.6:22-147.75.109.163:55666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:21:25.022885 kubelet[2063]: E1002 19:21:25.022847 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-htm56" podUID="337ce5b7-3c06-46ae-9ef6-1f5cfa4479b8" Oct 2 19:21:26.022670 env[1131]: time="2023-10-02T19:21:26.022556604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:26.148468 env[1131]: time="2023-10-02T19:21:26.148391725Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:26.150383 env[1131]: time="2023-10-02T19:21:26.150304213Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:26.150711 kubelet[2063]: E1002 19:21:26.150670 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:26.151257 kubelet[2063]: E1002 19:21:26.150728 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:26.151257 kubelet[2063]: E1002 19:21:26.150873 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ff6td,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-76csj_calico-apiserver(dda73f2b-f135-430b-84e2-e07847f76355): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:26.151257 kubelet[2063]: E1002 19:21:26.150934 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-76csj" podUID="dda73f2b-f135-430b-84e2-e07847f76355" Oct 2 19:21:29.026194 kubelet[2063]: E1002 19:21:29.026026 2063 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Oct 2 19:21:29.027169 env[1131]: time="2023-10-02T19:21:29.027089529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:29.154472 env[1131]: time="2023-10-02T19:21:29.154329529Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:29.156770 env[1131]: time="2023-10-02T19:21:29.156696177Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:29.157068 kubelet[2063]: E1002 19:21:29.157035 2063 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:29.157270 kubelet[2063]: E1002 19:21:29.157097 2063 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:29.157378 kubelet[2063]: E1002 19:21:29.157299 2063 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-f7fh7,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-85fdcc9864-58q54_calico-apiserver(0e3e935f-2dd4-4a13-8c73-84f98c64ae23): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:29.157378 kubelet[2063]: E1002 19:21:29.157371 2063 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-85fdcc9864-58q54" podUID="0e3e935f-2dd4-4a13-8c73-84f98c64ae23"