Oct 2 19:13:10.951659 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:13:10.951682 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:10.951695 kernel: BIOS-provided physical RAM map: Oct 2 19:13:10.951703 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:13:10.951710 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:13:10.951717 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:13:10.951725 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Oct 2 19:13:10.951733 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Oct 2 19:13:10.951742 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 2 19:13:10.951749 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:13:10.951756 kernel: NX (Execute Disable) protection: active Oct 2 19:13:10.951762 kernel: SMBIOS 2.8 present. Oct 2 19:13:10.951769 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Oct 2 19:13:10.951776 kernel: Hypervisor detected: KVM Oct 2 19:13:10.951785 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:13:10.951794 kernel: kvm-clock: cpu 0, msr 79f8a001, primary cpu clock Oct 2 19:13:10.951802 kernel: kvm-clock: using sched offset of 7015610804 cycles Oct 2 19:13:10.951810 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:13:10.951818 kernel: tsc: Detected 1996.249 MHz processor Oct 2 19:13:10.951825 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:13:10.951833 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:13:10.951841 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Oct 2 19:13:10.951849 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:13:10.951859 kernel: ACPI: Early table checksum verification disabled Oct 2 19:13:10.951867 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Oct 2 19:13:10.951874 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:10.951882 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:10.951890 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:10.951898 kernel: ACPI: FACS 0x000000007FFE0000 000040 Oct 2 19:13:10.951905 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:10.951913 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 2 19:13:10.951921 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Oct 2 19:13:10.951931 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Oct 2 19:13:10.951939 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Oct 2 19:13:10.951946 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Oct 2 19:13:10.951954 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Oct 2 19:13:10.951961 kernel: No NUMA configuration found Oct 2 19:13:10.951969 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Oct 2 19:13:10.951976 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Oct 2 19:13:10.951984 kernel: Zone ranges: Oct 2 19:13:10.951996 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:13:10.952004 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Oct 2 19:13:10.952012 kernel: Normal empty Oct 2 19:13:10.952020 kernel: Movable zone start for each node Oct 2 19:13:10.952028 kernel: Early memory node ranges Oct 2 19:13:10.952036 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:13:10.952045 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Oct 2 19:13:10.952053 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Oct 2 19:13:10.952061 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:13:10.952069 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:13:10.952077 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Oct 2 19:13:10.952085 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 2 19:13:10.952093 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:13:10.952101 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:13:10.952108 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:13:10.952118 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:13:10.952126 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:13:10.952134 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:13:10.952142 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:13:10.952150 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:13:10.952158 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:13:10.952166 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Oct 2 19:13:10.952174 kernel: Booting paravirtualized kernel on KVM Oct 2 19:13:10.952182 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:13:10.952190 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:13:10.952200 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:13:10.952208 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:13:10.952216 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:13:10.952224 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Oct 2 19:13:10.952232 kernel: kvm-guest: PV spinlocks disabled, no host support Oct 2 19:13:10.952240 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Oct 2 19:13:10.952247 kernel: Policy zone: DMA32 Oct 2 19:13:10.952257 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:10.952267 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:13:10.952275 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:13:10.952283 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:13:10.952291 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:13:10.952299 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121020K reserved, 0K cma-reserved) Oct 2 19:13:10.952307 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:13:10.952315 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:13:10.952323 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:13:10.952332 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:13:10.952341 kernel: rcu: RCU event tracing is enabled. Oct 2 19:13:10.952349 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:13:10.952357 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:13:10.952365 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:13:10.952373 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:13:10.952381 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:13:10.952389 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:13:10.952397 kernel: Console: colour VGA+ 80x25 Oct 2 19:13:10.952407 kernel: printk: console [tty0] enabled Oct 2 19:13:10.952415 kernel: printk: console [ttyS0] enabled Oct 2 19:13:10.952423 kernel: ACPI: Core revision 20210730 Oct 2 19:13:10.952431 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:13:10.952439 kernel: x2apic enabled Oct 2 19:13:10.952447 kernel: Switched APIC routing to physical x2apic. Oct 2 19:13:10.952455 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 19:13:10.952463 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Oct 2 19:13:10.952471 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Oct 2 19:13:10.952479 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 2 19:13:10.952489 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 2 19:13:10.952497 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:13:10.952505 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:13:10.952513 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:13:10.952521 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:13:10.952528 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:13:10.952550 kernel: x86/fpu: x87 FPU will use FXSAVE Oct 2 19:13:10.952559 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:13:10.952566 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:13:10.952577 kernel: LSM: Security Framework initializing Oct 2 19:13:10.952584 kernel: SELinux: Initializing. Oct 2 19:13:10.952592 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:13:10.952600 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:13:10.952609 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Oct 2 19:13:10.952616 kernel: Performance Events: AMD PMU driver. Oct 2 19:13:10.952624 kernel: ... version: 0 Oct 2 19:13:10.952632 kernel: ... bit width: 48 Oct 2 19:13:10.952640 kernel: ... generic registers: 4 Oct 2 19:13:10.952656 kernel: ... value mask: 0000ffffffffffff Oct 2 19:13:10.952664 kernel: ... max period: 00007fffffffffff Oct 2 19:13:10.952674 kernel: ... fixed-purpose events: 0 Oct 2 19:13:10.952682 kernel: ... event mask: 000000000000000f Oct 2 19:13:10.952690 kernel: signal: max sigframe size: 1440 Oct 2 19:13:10.952698 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:13:10.952707 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:13:10.952715 kernel: x86: Booting SMP configuration: Oct 2 19:13:10.952724 kernel: .... node #0, CPUs: #1 Oct 2 19:13:10.952733 kernel: kvm-clock: cpu 1, msr 79f8a041, secondary cpu clock Oct 2 19:13:10.952741 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Oct 2 19:13:10.952750 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:13:10.952758 kernel: smpboot: Max logical packages: 2 Oct 2 19:13:10.952766 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Oct 2 19:13:10.952774 kernel: devtmpfs: initialized Oct 2 19:13:10.952782 kernel: x86/mm: Memory block size: 128MB Oct 2 19:13:10.952791 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:13:10.952801 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:13:10.952809 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:13:10.952818 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:13:10.952826 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:13:10.952834 kernel: audit: type=2000 audit(1696273990.660:1): state=initialized audit_enabled=0 res=1 Oct 2 19:13:10.952842 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:13:10.952851 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:13:10.952859 kernel: cpuidle: using governor menu Oct 2 19:13:10.952867 kernel: ACPI: bus type PCI registered Oct 2 19:13:10.952877 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:13:10.952886 kernel: dca service started, version 1.12.1 Oct 2 19:13:10.952894 kernel: PCI: Using configuration type 1 for base access Oct 2 19:13:10.952902 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:13:10.952911 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:13:10.952919 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:13:10.952927 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:13:10.952936 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:13:10.952944 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:13:10.952954 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:13:10.952962 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:13:10.952970 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:13:10.952978 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:13:10.952987 kernel: ACPI: Interpreter enabled Oct 2 19:13:10.952995 kernel: ACPI: PM: (supports S0 S3 S5) Oct 2 19:13:10.953003 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:13:10.953011 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:13:10.953020 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Oct 2 19:13:10.953030 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:13:10.953170 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:13:10.953261 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:13:10.953274 kernel: acpiphp: Slot [3] registered Oct 2 19:13:10.953283 kernel: acpiphp: Slot [4] registered Oct 2 19:13:10.953291 kernel: acpiphp: Slot [5] registered Oct 2 19:13:10.953300 kernel: acpiphp: Slot [6] registered Oct 2 19:13:10.953311 kernel: acpiphp: Slot [7] registered Oct 2 19:13:10.953319 kernel: acpiphp: Slot [8] registered Oct 2 19:13:10.953327 kernel: acpiphp: Slot [9] registered Oct 2 19:13:10.953336 kernel: acpiphp: Slot [10] registered Oct 2 19:13:10.953344 kernel: acpiphp: Slot [11] registered Oct 2 19:13:10.953352 kernel: acpiphp: Slot [12] registered Oct 2 19:13:10.953360 kernel: acpiphp: Slot [13] registered Oct 2 19:13:10.953369 kernel: acpiphp: Slot [14] registered Oct 2 19:13:10.953377 kernel: acpiphp: Slot [15] registered Oct 2 19:13:10.953385 kernel: acpiphp: Slot [16] registered Oct 2 19:13:10.953398 kernel: acpiphp: Slot [17] registered Oct 2 19:13:10.953406 kernel: acpiphp: Slot [18] registered Oct 2 19:13:10.953414 kernel: acpiphp: Slot [19] registered Oct 2 19:13:10.953422 kernel: acpiphp: Slot [20] registered Oct 2 19:13:10.953430 kernel: acpiphp: Slot [21] registered Oct 2 19:13:10.953439 kernel: acpiphp: Slot [22] registered Oct 2 19:13:10.953447 kernel: acpiphp: Slot [23] registered Oct 2 19:13:10.953455 kernel: acpiphp: Slot [24] registered Oct 2 19:13:10.953463 kernel: acpiphp: Slot [25] registered Oct 2 19:13:10.953475 kernel: acpiphp: Slot [26] registered Oct 2 19:13:10.953483 kernel: acpiphp: Slot [27] registered Oct 2 19:13:10.953491 kernel: acpiphp: Slot [28] registered Oct 2 19:13:10.953500 kernel: acpiphp: Slot [29] registered Oct 2 19:13:10.953508 kernel: acpiphp: Slot [30] registered Oct 2 19:13:10.953516 kernel: acpiphp: Slot [31] registered Oct 2 19:13:10.953524 kernel: PCI host bridge to bus 0000:00 Oct 2 19:13:10.953655 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:13:10.953735 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:13:10.953816 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:13:10.953902 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:13:10.954039 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Oct 2 19:13:10.954115 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:13:10.954227 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:13:10.954325 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:13:10.954427 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Oct 2 19:13:10.954516 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Oct 2 19:13:10.957655 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Oct 2 19:13:10.957750 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Oct 2 19:13:10.957842 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Oct 2 19:13:10.957931 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Oct 2 19:13:10.958039 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Oct 2 19:13:10.958139 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Oct 2 19:13:10.958229 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Oct 2 19:13:10.958326 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Oct 2 19:13:10.958415 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Oct 2 19:13:10.958504 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Oct 2 19:13:10.958617 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Oct 2 19:13:10.958713 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Oct 2 19:13:10.958801 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:13:10.958940 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 2 19:13:10.959033 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Oct 2 19:13:10.959122 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Oct 2 19:13:10.959211 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Oct 2 19:13:10.959308 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Oct 2 19:13:10.959431 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 2 19:13:10.959520 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 2 19:13:10.959629 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Oct 2 19:13:10.959720 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Oct 2 19:13:10.959816 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Oct 2 19:13:10.959905 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Oct 2 19:13:10.959994 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Oct 2 19:13:10.960107 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Oct 2 19:13:10.960197 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Oct 2 19:13:10.960285 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Oct 2 19:13:10.960297 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:13:10.960306 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:13:10.960315 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:13:10.960323 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:13:10.960332 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:13:10.960344 kernel: iommu: Default domain type: Translated Oct 2 19:13:10.960352 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:13:10.960447 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Oct 2 19:13:10.960556 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:13:10.960649 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Oct 2 19:13:10.960662 kernel: vgaarb: loaded Oct 2 19:13:10.960670 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:13:10.960679 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:13:10.960687 kernel: PTP clock support registered Oct 2 19:13:10.960699 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:13:10.960707 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:13:10.960716 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:13:10.960724 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Oct 2 19:13:10.960732 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:13:10.960741 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:13:10.960749 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:13:10.960757 kernel: pnp: PnP ACPI init Oct 2 19:13:10.960848 kernel: pnp 00:03: [dma 2] Oct 2 19:13:10.960864 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:13:10.960873 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:13:10.960881 kernel: NET: Registered PF_INET protocol family Oct 2 19:13:10.960890 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:13:10.960898 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:13:10.960907 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:13:10.960916 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:13:10.960924 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:13:10.960934 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:13:10.960943 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:13:10.960951 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:13:10.960960 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:13:10.960968 kernel: NET: Registered PF_XDP protocol family Oct 2 19:13:10.961048 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:13:10.961137 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:13:10.961218 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:13:10.961299 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:13:10.961382 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Oct 2 19:13:10.961472 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Oct 2 19:13:10.965811 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:13:10.965920 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:13:10.965934 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:13:10.965943 kernel: Initialise system trusted keyrings Oct 2 19:13:10.965952 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:13:10.965973 kernel: Key type asymmetric registered Oct 2 19:13:10.965982 kernel: Asymmetric key parser 'x509' registered Oct 2 19:13:10.965991 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:13:10.965999 kernel: io scheduler mq-deadline registered Oct 2 19:13:10.966007 kernel: io scheduler kyber registered Oct 2 19:13:10.966016 kernel: io scheduler bfq registered Oct 2 19:13:10.966024 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:13:10.966033 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Oct 2 19:13:10.966042 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Oct 2 19:13:10.966050 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:13:10.966061 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Oct 2 19:13:10.966069 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:13:10.966078 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:13:10.966086 kernel: random: crng init done Oct 2 19:13:10.966095 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:13:10.966103 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:13:10.966111 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:13:10.966232 kernel: rtc_cmos 00:04: RTC can wake from S4 Oct 2 19:13:10.966251 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:13:10.966329 kernel: rtc_cmos 00:04: registered as rtc0 Oct 2 19:13:10.966407 kernel: rtc_cmos 00:04: setting system clock to 2023-10-02T19:13:10 UTC (1696273990) Oct 2 19:13:10.966483 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Oct 2 19:13:10.966495 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:13:10.966504 kernel: Segment Routing with IPv6 Oct 2 19:13:10.966512 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:13:10.966521 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:13:10.966529 kernel: Key type dns_resolver registered Oct 2 19:13:10.966556 kernel: IPI shorthand broadcast: enabled Oct 2 19:13:10.966565 kernel: sched_clock: Marking stable (697720094, 116139933)->(835243840, -21383813) Oct 2 19:13:10.966573 kernel: registered taskstats version 1 Oct 2 19:13:10.966582 kernel: Loading compiled-in X.509 certificates Oct 2 19:13:10.966590 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:13:10.966598 kernel: Key type .fscrypt registered Oct 2 19:13:10.966607 kernel: Key type fscrypt-provisioning registered Oct 2 19:13:10.966615 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:13:10.966630 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:13:10.966639 kernel: ima: No architecture policies found Oct 2 19:13:10.966647 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:13:10.966656 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:13:10.966664 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:13:10.966673 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:13:10.966681 kernel: Run /init as init process Oct 2 19:13:10.966689 kernel: with arguments: Oct 2 19:13:10.966698 kernel: /init Oct 2 19:13:10.966707 kernel: with environment: Oct 2 19:13:10.966716 kernel: HOME=/ Oct 2 19:13:10.966724 kernel: TERM=linux Oct 2 19:13:10.966732 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:13:10.966744 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:13:10.966755 systemd[1]: Detected virtualization kvm. Oct 2 19:13:10.966764 systemd[1]: Detected architecture x86-64. Oct 2 19:13:10.966773 systemd[1]: Running in initrd. Oct 2 19:13:10.966785 systemd[1]: No hostname configured, using default hostname. Oct 2 19:13:10.966794 systemd[1]: Hostname set to . Oct 2 19:13:10.966803 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:13:10.966812 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:13:10.966821 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:13:10.966831 systemd[1]: Reached target cryptsetup.target. Oct 2 19:13:10.966852 systemd[1]: Reached target paths.target. Oct 2 19:13:10.966866 systemd[1]: Reached target slices.target. Oct 2 19:13:10.966879 systemd[1]: Reached target swap.target. Oct 2 19:13:10.966888 systemd[1]: Reached target timers.target. Oct 2 19:13:10.966897 systemd[1]: Listening on iscsid.socket. Oct 2 19:13:10.966906 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:13:10.966915 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:13:10.966924 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:13:10.966933 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:13:10.966942 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:13:10.966954 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:13:10.966963 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:13:10.966972 systemd[1]: Reached target sockets.target. Oct 2 19:13:10.966981 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:13:10.966999 systemd[1]: Finished network-cleanup.service. Oct 2 19:13:10.967011 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:13:10.967022 systemd[1]: Starting systemd-journald.service... Oct 2 19:13:10.967031 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:13:10.967040 systemd[1]: Starting systemd-resolved.service... Oct 2 19:13:10.967050 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:13:10.967059 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:13:10.967068 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:13:10.967081 systemd-journald[185]: Journal started Oct 2 19:13:10.967138 systemd-journald[185]: Runtime Journal (/run/log/journal/459a2a9e2b8849809392e83197900772) is 4.9M, max 39.5M, 34.5M free. Oct 2 19:13:10.927569 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:13:10.990241 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:13:10.990267 kernel: Bridge firewalling registered Oct 2 19:13:10.990286 systemd[1]: Started systemd-journald.service. Oct 2 19:13:10.990302 kernel: audit: type=1130 audit(1696273990.985:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.978802 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:13:10.994624 kernel: audit: type=1130 audit(1696273990.990:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.978817 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:13:10.999161 kernel: audit: type=1130 audit(1696273990.994:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.978880 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:13:11.005333 kernel: audit: type=1130 audit(1696273990.999:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.981714 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:13:10.982654 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:13:10.990727 systemd[1]: Started systemd-resolved.service. Oct 2 19:13:10.995244 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:13:11.017675 kernel: SCSI subsystem initialized Oct 2 19:13:11.017698 kernel: audit: type=1130 audit(1696273991.016:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:10.999724 systemd[1]: Reached target nss-lookup.target. Oct 2 19:13:11.006428 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:13:11.007599 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:13:11.014722 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:13:11.037403 kernel: audit: type=1130 audit(1696273991.032:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.032303 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:13:11.033790 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:13:11.043400 dracut-cmdline[203]: dracut-dracut-053 Oct 2 19:13:11.047558 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:13:11.047587 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:13:11.047600 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:11.054645 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:13:11.055940 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:13:11.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.061623 kernel: audit: type=1130 audit(1696273991.057:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.057566 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:13:11.062500 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:13:11.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.069248 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:13:11.073573 kernel: audit: type=1130 audit(1696273991.069:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.120593 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:13:11.134580 kernel: iscsi: registered transport (tcp) Oct 2 19:13:11.157885 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:13:11.157924 kernel: QLogic iSCSI HBA Driver Oct 2 19:13:11.199062 kernel: audit: type=1130 audit(1696273991.194:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.194238 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:13:11.195866 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:13:11.273611 kernel: raid6: sse2x4 gen() 5847 MB/s Oct 2 19:13:11.290589 kernel: raid6: sse2x4 xor() 4940 MB/s Oct 2 19:13:11.307720 kernel: raid6: sse2x2 gen() 13406 MB/s Oct 2 19:13:11.326629 kernel: raid6: sse2x2 xor() 8144 MB/s Oct 2 19:13:11.343629 kernel: raid6: sse2x1 gen() 8875 MB/s Oct 2 19:13:11.361408 kernel: raid6: sse2x1 xor() 6906 MB/s Oct 2 19:13:11.361483 kernel: raid6: using algorithm sse2x2 gen() 13406 MB/s Oct 2 19:13:11.361511 kernel: raid6: .... xor() 8144 MB/s, rmw enabled Oct 2 19:13:11.362286 kernel: raid6: using ssse3x2 recovery algorithm Oct 2 19:13:11.377630 kernel: xor: measuring software checksum speed Oct 2 19:13:11.380257 kernel: prefetch64-sse : 17137 MB/sec Oct 2 19:13:11.380315 kernel: generic_sse : 15574 MB/sec Oct 2 19:13:11.380341 kernel: xor: using function: prefetch64-sse (17137 MB/sec) Oct 2 19:13:11.499606 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:13:11.516906 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:13:11.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.518000 audit: BPF prog-id=7 op=LOAD Oct 2 19:13:11.518000 audit: BPF prog-id=8 op=LOAD Oct 2 19:13:11.521038 systemd[1]: Starting systemd-udevd.service... Oct 2 19:13:11.554668 systemd-udevd[386]: Using default interface naming scheme 'v252'. Oct 2 19:13:11.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.566167 systemd[1]: Started systemd-udevd.service. Oct 2 19:13:11.568983 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:13:11.594961 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Oct 2 19:13:11.639063 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:13:11.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.640335 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:13:11.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:11.682079 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:13:11.744564 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Oct 2 19:13:11.756970 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:13:11.757022 kernel: GPT:17805311 != 41943039 Oct 2 19:13:11.757033 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:13:11.757839 kernel: GPT:17805311 != 41943039 Oct 2 19:13:11.759507 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:13:11.759529 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:11.764568 kernel: libata version 3.00 loaded. Oct 2 19:13:11.768848 kernel: ata_piix 0000:00:01.1: version 2.13 Oct 2 19:13:11.779657 kernel: scsi host0: ata_piix Oct 2 19:13:11.781594 kernel: scsi host1: ata_piix Oct 2 19:13:11.781716 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Oct 2 19:13:11.781729 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Oct 2 19:13:11.785557 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (437) Oct 2 19:13:11.799182 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:13:11.829672 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:13:11.830189 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:13:11.834914 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:13:11.839027 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:13:11.840300 systemd[1]: Starting disk-uuid.service... Oct 2 19:13:11.975064 disk-uuid[459]: Primary Header is updated. Oct 2 19:13:11.975064 disk-uuid[459]: Secondary Entries is updated. Oct 2 19:13:11.975064 disk-uuid[459]: Secondary Header is updated. Oct 2 19:13:12.074654 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:12.165284 kernel: GPT:disk_guids don't match. Oct 2 19:13:12.165371 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:13:12.165398 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:12.289591 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:13.178625 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 2 19:13:13.179023 disk-uuid[460]: The operation has completed successfully. Oct 2 19:13:13.239412 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:13:13.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.239697 systemd[1]: Finished disk-uuid.service. Oct 2 19:13:13.268614 systemd[1]: Starting verity-setup.service... Oct 2 19:13:13.288600 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:13:13.390703 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:13:13.395031 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:13:13.401010 systemd[1]: Finished verity-setup.service. Oct 2 19:13:13.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.563614 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:13:13.564242 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:13:13.564857 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:13:13.565605 systemd[1]: Starting ignition-setup.service... Oct 2 19:13:13.572324 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:13:13.582371 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:13.582455 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:13:13.582482 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:13:13.613599 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:13:13.639452 systemd[1]: Finished ignition-setup.service. Oct 2 19:13:13.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.640834 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:13:13.702994 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:13:13.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.704000 audit: BPF prog-id=9 op=LOAD Oct 2 19:13:13.705506 systemd[1]: Starting systemd-networkd.service... Oct 2 19:13:13.732349 systemd-networkd[630]: lo: Link UP Oct 2 19:13:13.732361 systemd-networkd[630]: lo: Gained carrier Oct 2 19:13:13.732995 systemd-networkd[630]: Enumeration completed Oct 2 19:13:13.733257 systemd-networkd[630]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:13:13.734434 systemd-networkd[630]: eth0: Link UP Oct 2 19:13:13.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.734440 systemd-networkd[630]: eth0: Gained carrier Oct 2 19:13:13.735044 systemd[1]: Started systemd-networkd.service. Oct 2 19:13:13.735611 systemd[1]: Reached target network.target. Oct 2 19:13:13.740513 systemd[1]: Starting iscsiuio.service... Oct 2 19:13:13.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.745943 systemd[1]: Started iscsiuio.service. Oct 2 19:13:13.747399 systemd[1]: Starting iscsid.service... Oct 2 19:13:13.750427 iscsid[635]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:13.750427 iscsid[635]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:13:13.750427 iscsid[635]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:13:13.750427 iscsid[635]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:13:13.750427 iscsid[635]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:13.750427 iscsid[635]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:13:13.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.750618 systemd-networkd[630]: eth0: DHCPv4 address 172.24.4.229/24, gateway 172.24.4.1 acquired from 172.24.4.1 Oct 2 19:13:13.752736 systemd[1]: Started iscsid.service. Oct 2 19:13:13.756616 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:13:13.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:13.769654 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:13:13.770270 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:13:13.770797 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:13:13.771785 systemd[1]: Reached target remote-fs.target. Oct 2 19:13:13.773485 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:13:13.782002 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:13:13.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:14.716290 ignition[586]: Ignition 2.14.0 Oct 2 19:13:14.717239 ignition[586]: Stage: fetch-offline Oct 2 19:13:14.717347 ignition[586]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:14.717386 ignition[586]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:14.719573 ignition[586]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:14.719860 ignition[586]: parsed url from cmdline: "" Oct 2 19:13:14.719870 ignition[586]: no config URL provided Oct 2 19:13:14.719884 ignition[586]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:13:14.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:14.722418 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:13:14.719903 ignition[586]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:13:14.726258 systemd[1]: Starting ignition-fetch.service... Oct 2 19:13:14.719913 ignition[586]: failed to fetch config: resource requires networking Oct 2 19:13:14.720712 ignition[586]: Ignition finished successfully Oct 2 19:13:14.742699 ignition[653]: Ignition 2.14.0 Oct 2 19:13:14.742724 ignition[653]: Stage: fetch Oct 2 19:13:14.742982 ignition[653]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:14.743032 ignition[653]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:14.745323 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:14.745529 ignition[653]: parsed url from cmdline: "" Oct 2 19:13:14.745608 ignition[653]: no config URL provided Oct 2 19:13:14.745624 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:13:14.745647 ignition[653]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:13:14.746601 ignition[653]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 2 19:13:14.746655 ignition[653]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 2 19:13:14.752320 ignition[653]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 2 19:13:15.087192 ignition[653]: GET result: OK Oct 2 19:13:15.087410 ignition[653]: parsing config with SHA512: cbe89fed8c5bace10ac52e2a7a8f244529deebef4752890be7eef802531a9a3b5bd8a1100c5cfa344a1e38027efb3be752a3d33d31430f299b87283d6ed005d9 Oct 2 19:13:15.182927 unknown[653]: fetched base config from "system" Oct 2 19:13:15.183645 unknown[653]: fetched base config from "system" Oct 2 19:13:15.183667 unknown[653]: fetched user config from "openstack" Oct 2 19:13:15.184997 ignition[653]: fetch: fetch complete Oct 2 19:13:15.185012 ignition[653]: fetch: fetch passed Oct 2 19:13:15.188961 systemd[1]: Finished ignition-fetch.service. Oct 2 19:13:15.212463 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:13:15.212507 kernel: audit: type=1130 audit(1696273995.190:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.185142 ignition[653]: Ignition finished successfully Oct 2 19:13:15.193001 systemd[1]: Starting ignition-kargs.service... Oct 2 19:13:15.233624 ignition[659]: Ignition 2.14.0 Oct 2 19:13:15.233659 ignition[659]: Stage: kargs Oct 2 19:13:15.234011 ignition[659]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:15.234071 ignition[659]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:15.236710 ignition[659]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:15.239924 ignition[659]: kargs: kargs passed Oct 2 19:13:15.240055 ignition[659]: Ignition finished successfully Oct 2 19:13:15.252807 kernel: audit: type=1130 audit(1696273995.242:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.241480 systemd[1]: Finished ignition-kargs.service. Oct 2 19:13:15.244114 systemd[1]: Starting ignition-disks.service... Oct 2 19:13:15.258147 ignition[664]: Ignition 2.14.0 Oct 2 19:13:15.258168 ignition[664]: Stage: disks Oct 2 19:13:15.258375 ignition[664]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:15.258412 ignition[664]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:15.263812 systemd[1]: Finished ignition-disks.service. Oct 2 19:13:15.272305 kernel: audit: type=1130 audit(1696273995.264:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.260196 ignition[664]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:15.265037 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:13:15.262471 ignition[664]: disks: disks passed Oct 2 19:13:15.273148 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:13:15.262596 ignition[664]: Ignition finished successfully Oct 2 19:13:15.274626 systemd[1]: Reached target local-fs.target. Oct 2 19:13:15.275904 systemd[1]: Reached target sysinit.target. Oct 2 19:13:15.277184 systemd[1]: Reached target basic.target. Oct 2 19:13:15.279884 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:13:15.301260 systemd-fsck[672]: ROOT: clean, 603/1628000 files, 124049/1617920 blocks Oct 2 19:13:15.316384 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:13:15.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.319588 systemd[1]: Mounting sysroot.mount... Oct 2 19:13:15.327880 kernel: audit: type=1130 audit(1696273995.317:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.341577 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:13:15.342490 systemd[1]: Mounted sysroot.mount. Oct 2 19:13:15.343823 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:13:15.348033 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:13:15.349994 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:13:15.351454 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 2 19:13:15.352823 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:13:15.352893 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:13:15.365936 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:13:15.374741 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:13:15.377534 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:13:15.390274 systemd-networkd[630]: eth0: Gained IPv6LL Oct 2 19:13:15.398224 initrd-setup-root[684]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:13:15.405588 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (679) Oct 2 19:13:15.420882 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:15.420976 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:13:15.420997 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:13:15.430572 initrd-setup-root[701]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:13:15.438897 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:13:15.442953 initrd-setup-root[718]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:13:15.451884 initrd-setup-root[726]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:13:15.578224 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:13:15.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.589943 systemd[1]: Starting ignition-mount.service... Oct 2 19:13:15.596239 kernel: audit: type=1130 audit(1696273995.579:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.593860 systemd[1]: Starting sysroot-boot.service... Oct 2 19:13:15.608804 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:13:15.609042 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:13:15.645493 ignition[746]: INFO : Ignition 2.14.0 Oct 2 19:13:15.647370 ignition[746]: INFO : Stage: mount Oct 2 19:13:15.649046 ignition[746]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:15.650985 ignition[746]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:15.657575 ignition[746]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:15.660526 ignition[746]: INFO : mount: mount passed Oct 2 19:13:15.661139 ignition[746]: INFO : Ignition finished successfully Oct 2 19:13:15.661672 coreos-metadata[678]: Oct 02 19:13:15.661 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 2 19:13:15.662385 systemd[1]: Finished ignition-mount.service. Oct 2 19:13:15.667980 kernel: audit: type=1130 audit(1696273995.663:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.679599 systemd[1]: Finished sysroot-boot.service. Oct 2 19:13:15.684304 kernel: audit: type=1130 audit(1696273995.679:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.686190 coreos-metadata[678]: Oct 02 19:13:15.686 INFO Fetch successful Oct 2 19:13:15.686190 coreos-metadata[678]: Oct 02 19:13:15.686 INFO wrote hostname ci-3510-3-0-b-c273fa9e33.novalocal to /sysroot/etc/hostname Oct 2 19:13:15.689952 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 2 19:13:15.690062 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 2 19:13:15.700807 kernel: audit: type=1130 audit(1696273995.690:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.700856 kernel: audit: type=1131 audit(1696273995.690:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:15.692254 systemd[1]: Starting ignition-files.service... Oct 2 19:13:15.705055 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:13:15.717570 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (755) Oct 2 19:13:15.725299 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:15.725378 kernel: BTRFS info (device vda6): using free space tree Oct 2 19:13:15.725398 kernel: BTRFS info (device vda6): has skinny extents Oct 2 19:13:15.734372 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:13:15.749428 ignition[774]: INFO : Ignition 2.14.0 Oct 2 19:13:15.749428 ignition[774]: INFO : Stage: files Oct 2 19:13:15.750546 ignition[774]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:15.750546 ignition[774]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:15.752211 ignition[774]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:15.754459 ignition[774]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:13:15.755398 ignition[774]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:13:15.755398 ignition[774]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:13:15.760452 ignition[774]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:13:15.761258 ignition[774]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:13:15.762415 unknown[774]: wrote ssh authorized keys file for user: core Oct 2 19:13:15.763100 ignition[774]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:13:15.765440 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:13:15.765440 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:13:16.146748 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:13:16.492133 ignition[774]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:13:16.492133 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:13:16.497364 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:13:16.497364 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:13:16.755773 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:13:16.969942 ignition[774]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:13:16.973569 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:13:16.973569 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:16.973569 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:13:17.153601 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:13:18.950410 ignition[774]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:13:18.954989 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:18.954989 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:13:18.954989 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:13:19.118879 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:13:22.121070 ignition[774]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:13:22.122640 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:13:22.122640 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:13:22.122640 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:13:22.277607 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:13:24.140037 ignition[774]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:13:24.140037 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:13:24.140037 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:13:24.140037 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:13:24.140037 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:13:24.150057 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:13:24.150057 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:13:24.150057 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(b): op(c): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(b): op(c): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(d): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(d): op(e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(d): op(e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(d): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(f): [started] processing unit "prepare-critools.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(f): op(10): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(f): op(10): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(f): [finished] processing unit "prepare-critools.service" Oct 2 19:13:24.150057 ignition[774]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Oct 2 19:13:24.174043 kernel: audit: type=1130 audit(1696274004.165:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.161131 systemd[1]: Finished ignition-files.service. Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(11): op(12): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(11): op(12): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(13): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(13): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(14): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(15): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:13:24.177240 ignition[774]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:13:24.177240 ignition[774]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:13:24.177240 ignition[774]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:13:24.177240 ignition[774]: INFO : files: files passed Oct 2 19:13:24.177240 ignition[774]: INFO : Ignition finished successfully Oct 2 19:13:24.234247 kernel: audit: type=1130 audit(1696274004.187:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.234271 kernel: audit: type=1130 audit(1696274004.202:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.234288 kernel: audit: type=1131 audit(1696274004.202:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.234300 kernel: audit: type=1130 audit(1696274004.223:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.234312 kernel: audit: type=1131 audit(1696274004.225:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.170493 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:13:24.180651 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:13:24.236020 initrd-setup-root-after-ignition[798]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:13:24.181625 systemd[1]: Starting ignition-quench.service... Oct 2 19:13:24.187153 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:13:24.187723 systemd[1]: Reached target ignition-complete.target. Oct 2 19:13:24.197811 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:13:24.201728 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:13:24.201923 systemd[1]: Finished ignition-quench.service. Oct 2 19:13:24.248142 kernel: audit: type=1130 audit(1696274004.243:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.222984 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:13:24.223074 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:13:24.225735 systemd[1]: Reached target initrd-fs.target. Oct 2 19:13:24.230309 systemd[1]: Reached target initrd.target. Oct 2 19:13:24.230819 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:13:24.231695 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:13:24.242781 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:13:24.244993 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:13:24.254125 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:13:24.255548 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:13:24.256454 systemd[1]: Stopped target timers.target. Oct 2 19:13:24.261682 kernel: audit: type=1131 audit(1696274004.257:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.257277 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:13:24.257421 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:13:24.258315 systemd[1]: Stopped target initrd.target. Oct 2 19:13:24.262206 systemd[1]: Stopped target basic.target. Oct 2 19:13:24.263100 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:13:24.263969 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:13:24.264860 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:13:24.265748 systemd[1]: Stopped target remote-fs.target. Oct 2 19:13:24.266609 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:13:24.267464 systemd[1]: Stopped target sysinit.target. Oct 2 19:13:24.268346 systemd[1]: Stopped target local-fs.target. Oct 2 19:13:24.269163 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:13:24.275114 kernel: audit: type=1131 audit(1696274004.271:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.270015 systemd[1]: Stopped target swap.target. Oct 2 19:13:24.270767 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:13:24.280062 kernel: audit: type=1131 audit(1696274004.275:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.270923 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:13:24.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.271762 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:13:24.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.275614 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:13:24.275751 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:13:24.276618 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:13:24.287162 iscsid[635]: iscsid shutting down. Oct 2 19:13:24.276766 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:13:24.280686 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:13:24.280838 systemd[1]: Stopped ignition-files.service. Oct 2 19:13:24.282324 systemd[1]: Stopping ignition-mount.service... Oct 2 19:13:24.283014 systemd[1]: Stopping iscsid.service... Oct 2 19:13:24.290998 ignition[812]: INFO : Ignition 2.14.0 Oct 2 19:13:24.290998 ignition[812]: INFO : Stage: umount Oct 2 19:13:24.290998 ignition[812]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:24.290998 ignition[812]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 2 19:13:24.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.298757 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 2 19:13:24.298757 ignition[812]: INFO : umount: umount passed Oct 2 19:13:24.298757 ignition[812]: INFO : Ignition finished successfully Oct 2 19:13:24.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.291478 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:13:24.291690 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:13:24.293308 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:13:24.299284 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:13:24.299458 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:13:24.300016 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:13:24.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.300120 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:13:24.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.302437 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:13:24.306992 systemd[1]: Stopped iscsid.service. Oct 2 19:13:24.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.308378 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:13:24.308987 systemd[1]: Stopped ignition-mount.service. Oct 2 19:13:24.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.310394 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:13:24.310480 systemd[1]: Stopped ignition-disks.service. Oct 2 19:13:24.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.311041 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:13:24.311077 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:13:24.311499 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:13:24.312561 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:13:24.313493 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:13:24.313634 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:13:24.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.315487 systemd[1]: Stopped target paths.target. Oct 2 19:13:24.316402 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:13:24.316648 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:13:24.318747 systemd[1]: Stopped target slices.target. Oct 2 19:13:24.319179 systemd[1]: Stopped target sockets.target. Oct 2 19:13:24.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.319656 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:13:24.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.319688 systemd[1]: Closed iscsid.socket. Oct 2 19:13:24.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.320683 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:13:24.320752 systemd[1]: Stopped ignition-setup.service. Oct 2 19:13:24.321337 systemd[1]: Stopping iscsiuio.service... Oct 2 19:13:24.325588 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:13:24.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.326112 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:13:24.326201 systemd[1]: Stopped iscsiuio.service. Oct 2 19:13:24.327079 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:13:24.327160 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:13:24.328013 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:13:24.328097 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:13:24.329468 systemd[1]: Stopped target network.target. Oct 2 19:13:24.330023 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:13:24.330056 systemd[1]: Closed iscsiuio.socket. Oct 2 19:13:24.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.330853 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:13:24.330891 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:13:24.331852 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:13:24.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.333007 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:13:24.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.336643 systemd-networkd[630]: eth0: DHCPv6 lease lost Oct 2 19:13:24.345000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:13:24.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.337779 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:13:24.337884 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:13:24.340294 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:13:24.340340 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:13:24.341742 systemd[1]: Stopping network-cleanup.service... Oct 2 19:13:24.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.342435 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:13:24.342488 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:13:24.344760 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:13:24.344800 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:13:24.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.345855 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:13:24.345893 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:13:24.357000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:13:24.346804 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:13:24.348467 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:13:24.349009 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:13:24.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.349114 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:13:24.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.352358 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:13:24.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.352490 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:13:24.357875 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:13:24.357911 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:13:24.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.360108 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:13:24.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.360147 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:13:24.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.361018 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:13:24.361082 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:13:24.362170 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:13:24.362208 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:13:24.363058 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:13:24.363094 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:13:24.364656 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:13:24.365337 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:13:24.365392 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:13:24.372351 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:13:24.372432 systemd[1]: Stopped network-cleanup.service. Oct 2 19:13:24.373087 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:13:24.373158 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:13:24.374156 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:13:24.375705 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:13:24.394781 systemd[1]: Switching root. Oct 2 19:13:24.412613 systemd-journald[185]: Journal stopped Oct 2 19:13:29.140932 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:13:29.140993 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:13:29.141010 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:13:29.141022 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:13:29.141033 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:13:29.141044 kernel: SELinux: policy capability open_perms=1 Oct 2 19:13:29.141055 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:13:29.141066 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:13:29.141079 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:13:29.141090 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:13:29.141103 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:13:29.141118 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:13:29.141134 systemd[1]: Successfully loaded SELinux policy in 93.559ms. Oct 2 19:13:29.141155 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.344ms. Oct 2 19:13:29.141169 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:13:29.141181 systemd[1]: Detected virtualization kvm. Oct 2 19:13:29.141192 systemd[1]: Detected architecture x86-64. Oct 2 19:13:29.141203 systemd[1]: Detected first boot. Oct 2 19:13:29.141218 systemd[1]: Hostname set to . Oct 2 19:13:29.141236 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:13:29.141247 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:13:29.141259 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:13:29.141271 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:13:29.141290 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:13:29.141303 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:13:29.141314 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:13:29.141327 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:13:29.141339 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:13:29.141351 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:13:29.141363 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:13:29.141374 systemd[1]: Created slice system-getty.slice. Oct 2 19:13:29.141386 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:13:29.141399 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:13:29.141411 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:13:29.141424 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:13:29.141435 systemd[1]: Created slice user.slice. Oct 2 19:13:29.141447 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:13:29.141458 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:13:29.141470 systemd[1]: Set up automount boot.automount. Oct 2 19:13:29.141481 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:13:29.141493 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:13:29.141506 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:13:29.141518 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:13:29.141529 systemd[1]: Reached target integritysetup.target. Oct 2 19:13:29.141591 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:13:29.141605 systemd[1]: Reached target remote-fs.target. Oct 2 19:13:29.141616 systemd[1]: Reached target slices.target. Oct 2 19:13:29.141627 systemd[1]: Reached target swap.target. Oct 2 19:13:29.141639 systemd[1]: Reached target torcx.target. Oct 2 19:13:29.141650 systemd[1]: Reached target veritysetup.target. Oct 2 19:13:29.141663 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:13:29.141675 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:13:29.141686 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:13:29.141697 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:13:29.141708 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:13:29.141721 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:13:29.141732 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:13:29.141743 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:13:29.141755 systemd[1]: Mounting media.mount... Oct 2 19:13:29.141767 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:13:29.141779 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:13:29.141791 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:13:29.141802 systemd[1]: Mounting tmp.mount... Oct 2 19:13:29.141814 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:13:29.141825 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:13:29.141836 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:13:29.141848 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:13:29.141859 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:13:29.141871 systemd[1]: Starting modprobe@drm.service... Oct 2 19:13:29.141883 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:13:29.141894 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:13:29.141905 systemd[1]: Starting modprobe@loop.service... Oct 2 19:13:29.141916 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:13:29.141928 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:13:29.141939 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:13:29.141950 kernel: loop: module loaded Oct 2 19:13:29.141963 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:13:29.141976 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:13:29.141988 systemd[1]: Stopped systemd-journald.service. Oct 2 19:13:29.141999 systemd[1]: Starting systemd-journald.service... Oct 2 19:13:29.142010 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:13:29.142021 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:13:29.142033 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:13:29.142044 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:13:29.142056 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:13:29.142067 systemd[1]: Stopped verity-setup.service. Oct 2 19:13:29.142079 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:13:29.142092 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:13:29.142103 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:13:29.142115 systemd[1]: Mounted media.mount. Oct 2 19:13:29.142126 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:13:29.142137 kernel: fuse: init (API version 7.34) Oct 2 19:13:29.142147 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:13:29.142159 systemd[1]: Mounted tmp.mount. Oct 2 19:13:29.142171 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:13:29.142182 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:13:29.142194 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:13:29.142207 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:13:29.142219 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:13:29.142231 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:13:29.142243 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:13:29.142255 systemd[1]: Finished modprobe@drm.service. Oct 2 19:13:29.142269 systemd-journald[935]: Journal started Oct 2 19:13:29.142317 systemd-journald[935]: Runtime Journal (/run/log/journal/459a2a9e2b8849809392e83197900772) is 4.9M, max 39.5M, 34.5M free. Oct 2 19:13:24.713000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:13:24.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:13:24.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:13:24.839000 audit: BPF prog-id=10 op=LOAD Oct 2 19:13:24.839000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:13:24.839000 audit: BPF prog-id=11 op=LOAD Oct 2 19:13:24.839000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:13:28.907000 audit: BPF prog-id=12 op=LOAD Oct 2 19:13:28.907000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:13:28.907000 audit: BPF prog-id=13 op=LOAD Oct 2 19:13:28.907000 audit: BPF prog-id=14 op=LOAD Oct 2 19:13:28.907000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:13:28.907000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:13:28.908000 audit: BPF prog-id=15 op=LOAD Oct 2 19:13:28.908000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:13:28.908000 audit: BPF prog-id=16 op=LOAD Oct 2 19:13:28.908000 audit: BPF prog-id=17 op=LOAD Oct 2 19:13:28.908000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:13:28.908000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:13:28.909000 audit: BPF prog-id=18 op=LOAD Oct 2 19:13:28.909000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:13:28.909000 audit: BPF prog-id=19 op=LOAD Oct 2 19:13:28.910000 audit: BPF prog-id=20 op=LOAD Oct 2 19:13:28.910000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:13:28.910000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:13:28.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:28.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:28.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:28.920000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:13:29.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.076000 audit: BPF prog-id=21 op=LOAD Oct 2 19:13:29.077000 audit: BPF prog-id=22 op=LOAD Oct 2 19:13:29.077000 audit: BPF prog-id=23 op=LOAD Oct 2 19:13:29.077000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:13:29.077000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:13:29.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.139000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:13:29.139000 audit[935]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcfc0afa40 a2=4000 a3=7ffcfc0afadc items=0 ppid=1 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:29.143439 systemd[1]: Started systemd-journald.service. Oct 2 19:13:29.139000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:13:29.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.993443 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:13:28.905980 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:13:24.994568 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:13:28.905993 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 2 19:13:24.994593 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:13:28.911059 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:13:29.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.994646 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:13:24.994658 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:13:24.994690 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:13:29.144190 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:13:24.994705 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:13:29.144301 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:13:24.995029 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:13:24.995068 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:13:24.995082 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:13:29.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:24.995938 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:13:24.995975 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:13:24.995996 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:13:24.996012 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:13:29.145209 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:13:24.996031 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:13:24.996047 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:13:29.145341 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:13:28.436790 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:28.437100 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:29.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:28.437217 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:28.437439 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:13:28.437501 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:13:28.437605 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2023-10-02T19:13:28Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:13:29.146239 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:13:29.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.146414 systemd[1]: Finished modprobe@loop.service. Oct 2 19:13:29.147184 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:13:29.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.148301 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:13:29.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.149251 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:13:29.150380 systemd[1]: Reached target network-pre.target. Oct 2 19:13:29.152381 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:13:29.156654 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:13:29.159393 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:13:29.162053 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:13:29.167361 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:13:29.167922 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:13:29.169185 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:13:29.169801 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:13:29.171396 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:13:29.175091 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:13:29.176884 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:13:29.178640 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:13:29.184860 systemd-journald[935]: Time spent on flushing to /var/log/journal/459a2a9e2b8849809392e83197900772 is 64.375ms for 1125 entries. Oct 2 19:13:29.184860 systemd-journald[935]: System Journal (/var/log/journal/459a2a9e2b8849809392e83197900772) is 8.0M, max 584.8M, 576.8M free. Oct 2 19:13:29.274898 systemd-journald[935]: Received client request to flush runtime journal. Oct 2 19:13:29.274959 kernel: kauditd_printk_skb: 92 callbacks suppressed Oct 2 19:13:29.274979 kernel: audit: type=1130 audit(1696274009.204:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.275001 kernel: audit: type=1130 audit(1696274009.213:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.275018 kernel: audit: type=1130 audit(1696274009.231:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.204353 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:13:29.275596 udevadm[955]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:13:29.204969 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:13:29.213444 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:13:29.215168 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:13:29.231205 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:13:29.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.281575 kernel: audit: type=1130 audit(1696274009.276:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.276966 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:13:29.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:29.307424 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:13:29.312638 kernel: audit: type=1130 audit(1696274009.307:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.310099 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:13:30.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.320000 audit: BPF prog-id=24 op=LOAD Oct 2 19:13:30.323734 kernel: audit: type=1130 audit(1696274010.310:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.323864 kernel: audit: type=1334 audit(1696274010.320:144): prog-id=24 op=LOAD Oct 2 19:13:30.323000 audit: BPF prog-id=25 op=LOAD Oct 2 19:13:30.326985 kernel: audit: type=1334 audit(1696274010.323:145): prog-id=25 op=LOAD Oct 2 19:13:30.327090 kernel: audit: type=1334 audit(1696274010.323:146): prog-id=7 op=UNLOAD Oct 2 19:13:30.323000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:13:30.330049 kernel: audit: type=1334 audit(1696274010.323:147): prog-id=8 op=UNLOAD Oct 2 19:13:30.323000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:13:30.330615 systemd[1]: Starting systemd-udevd.service... Oct 2 19:13:30.373341 systemd-udevd[957]: Using default interface naming scheme 'v252'. Oct 2 19:13:30.426266 systemd[1]: Started systemd-udevd.service. Oct 2 19:13:30.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.429000 audit: BPF prog-id=26 op=LOAD Oct 2 19:13:30.434321 systemd[1]: Starting systemd-networkd.service... Oct 2 19:13:30.446000 audit: BPF prog-id=27 op=LOAD Oct 2 19:13:30.447000 audit: BPF prog-id=28 op=LOAD Oct 2 19:13:30.447000 audit: BPF prog-id=29 op=LOAD Oct 2 19:13:30.449935 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:13:30.487609 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:13:30.530378 systemd[1]: Started systemd-userdbd.service. Oct 2 19:13:30.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.562696 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:13:30.601066 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:13:30.608000 audit[961]: AVC avc: denied { confidentiality } for pid=961 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:13:30.608000 audit[961]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8ac7f9520 a1=32194 a2=7fa6c2481bc5 a3=5 items=106 ppid=957 pid=961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:30.608000 audit: CWD cwd="/" Oct 2 19:13:30.608000 audit: PATH item=0 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=1 name=(null) inode=14464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=2 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=3 name=(null) inode=14465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=4 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=5 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=6 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=7 name=(null) inode=14467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=8 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=9 name=(null) inode=14468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=10 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=11 name=(null) inode=14469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=12 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=13 name=(null) inode=14470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=14 name=(null) inode=14466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=15 name=(null) inode=14471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=16 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=17 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=18 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=19 name=(null) inode=14473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=20 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=21 name=(null) inode=14474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=22 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=23 name=(null) inode=14475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=24 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=25 name=(null) inode=14476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=26 name=(null) inode=14472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=27 name=(null) inode=14477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=28 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=29 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=30 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=31 name=(null) inode=14479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=32 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=33 name=(null) inode=14480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=34 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=35 name=(null) inode=14481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=36 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=37 name=(null) inode=14482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=38 name=(null) inode=14478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=39 name=(null) inode=14483 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=40 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=41 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=42 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=43 name=(null) inode=14485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=44 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=45 name=(null) inode=14486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=46 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=47 name=(null) inode=14487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=48 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=49 name=(null) inode=14488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=50 name=(null) inode=14484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=51 name=(null) inode=14489 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=52 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=53 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=54 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=55 name=(null) inode=14491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=56 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=57 name=(null) inode=14492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=58 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=59 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=60 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=61 name=(null) inode=14494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=62 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=63 name=(null) inode=14495 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=64 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=65 name=(null) inode=14496 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=66 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=67 name=(null) inode=14497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=68 name=(null) inode=14493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=69 name=(null) inode=14498 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=70 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=71 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=72 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=73 name=(null) inode=14500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=74 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=75 name=(null) inode=14501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=76 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=77 name=(null) inode=14502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=78 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=79 name=(null) inode=14503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=80 name=(null) inode=14499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=81 name=(null) inode=14504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=82 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=83 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=84 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=85 name=(null) inode=14506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=86 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=87 name=(null) inode=14507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=88 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=89 name=(null) inode=14508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=90 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=91 name=(null) inode=14509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=92 name=(null) inode=14505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=93 name=(null) inode=14510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=94 name=(null) inode=14490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=95 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=96 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=97 name=(null) inode=14512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=98 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=99 name=(null) inode=14513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=100 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=101 name=(null) inode=14514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=102 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=103 name=(null) inode=14515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=104 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PATH item=105 name=(null) inode=14516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:13:30.608000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:13:30.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.628411 systemd-networkd[973]: lo: Link UP Oct 2 19:13:30.628416 systemd-networkd[973]: lo: Gained carrier Oct 2 19:13:30.628898 systemd-networkd[973]: Enumeration completed Oct 2 19:13:30.629025 systemd-networkd[973]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:13:30.629030 systemd[1]: Started systemd-networkd.service. Oct 2 19:13:30.632092 systemd-networkd[973]: eth0: Link UP Oct 2 19:13:30.632097 systemd-networkd[973]: eth0: Gained carrier Oct 2 19:13:30.645945 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 2 19:13:30.646089 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:13:30.646765 systemd-networkd[973]: eth0: DHCPv4 address 172.24.4.229/24, gateway 172.24.4.1 acquired from 172.24.4.1 Oct 2 19:13:30.657576 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:13:30.661563 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Oct 2 19:13:30.706977 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:13:30.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.708942 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:13:30.741591 lvm[986]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:13:30.767840 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:13:30.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.769285 systemd[1]: Reached target cryptsetup.target. Oct 2 19:13:30.772954 systemd[1]: Starting lvm2-activation.service... Oct 2 19:13:30.782814 lvm[987]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:13:30.821687 systemd[1]: Finished lvm2-activation.service. Oct 2 19:13:30.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.823052 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:13:30.824204 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:13:30.824269 systemd[1]: Reached target local-fs.target. Oct 2 19:13:30.825384 systemd[1]: Reached target machines.target. Oct 2 19:13:30.829183 systemd[1]: Starting ldconfig.service... Oct 2 19:13:30.831661 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:13:30.831792 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:30.834096 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:13:30.837385 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:13:30.847254 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:13:30.848724 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:13:30.848829 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:13:30.852365 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:13:30.883698 systemd[1]: boot.automount: Got automount request for /boot, triggered by 989 (bootctl) Oct 2 19:13:30.886342 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:13:30.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:30.907877 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:13:31.149658 systemd-tmpfiles[992]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:13:31.187576 systemd-tmpfiles[992]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:13:31.190640 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:13:31.191999 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:13:31.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.214357 systemd-tmpfiles[992]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:13:31.339709 systemd-fsck[997]: fsck.fat 4.2 (2021-01-31) Oct 2 19:13:31.339709 systemd-fsck[997]: /dev/vda1: 789 files, 115069/258078 clusters Oct 2 19:13:31.350068 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:13:31.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.356768 systemd[1]: Mounting boot.mount... Oct 2 19:13:31.372876 systemd[1]: Mounted boot.mount. Oct 2 19:13:31.403741 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:13:31.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.491313 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:13:31.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.493385 systemd[1]: Starting audit-rules.service... Oct 2 19:13:31.495525 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:13:31.497421 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:13:31.501000 audit: BPF prog-id=30 op=LOAD Oct 2 19:13:31.504080 systemd[1]: Starting systemd-resolved.service... Oct 2 19:13:31.509000 audit: BPF prog-id=31 op=LOAD Oct 2 19:13:31.512929 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:13:31.519878 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:13:31.542351 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:13:31.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.543633 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:13:31.551000 audit[1008]: SYSTEM_BOOT pid=1008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.553102 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:13:31.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.579921 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:13:31.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:31.615000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:13:31.615000 audit[1020]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb89f8650 a2=420 a3=0 items=0 ppid=1000 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:31.615000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:13:31.616835 augenrules[1020]: No rules Oct 2 19:13:31.617550 systemd[1]: Finished audit-rules.service. Oct 2 19:13:31.635831 systemd-resolved[1004]: Positive Trust Anchors: Oct 2 19:13:31.635849 systemd-resolved[1004]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:13:31.635892 systemd-resolved[1004]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:13:31.646071 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:13:31.646713 systemd[1]: Reached target time-set.target. Oct 2 19:13:31.650347 systemd-resolved[1004]: Using system hostname 'ci-3510-3-0-b-c273fa9e33.novalocal'. Oct 2 19:13:31.652780 systemd[1]: Started systemd-resolved.service. Oct 2 19:13:31.653370 systemd[1]: Reached target network.target. Oct 2 19:13:31.653869 systemd[1]: Reached target nss-lookup.target. Oct 2 19:13:31.709765 systemd-networkd[973]: eth0: Gained IPv6LL Oct 2 19:13:32.581174 systemd-timesyncd[1005]: Contacted time server 51.68.44.27:123 (0.flatcar.pool.ntp.org). Oct 2 19:13:32.581244 systemd-resolved[1004]: Clock change detected. Flushing caches. Oct 2 19:13:32.582056 systemd-timesyncd[1005]: Initial clock synchronization to Mon 2023-10-02 19:13:32.580948 UTC. Oct 2 19:13:32.588943 ldconfig[988]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:13:32.602872 systemd[1]: Finished ldconfig.service. Oct 2 19:13:32.606988 systemd[1]: Starting systemd-update-done.service... Oct 2 19:13:32.622508 systemd[1]: Finished systemd-update-done.service. Oct 2 19:13:32.623844 systemd[1]: Reached target sysinit.target. Oct 2 19:13:32.625215 systemd[1]: Started motdgen.path. Oct 2 19:13:32.626316 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:13:32.628103 systemd[1]: Started logrotate.timer. Oct 2 19:13:32.629392 systemd[1]: Started mdadm.timer. Oct 2 19:13:32.630437 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:13:32.631556 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:13:32.631626 systemd[1]: Reached target paths.target. Oct 2 19:13:32.632779 systemd[1]: Reached target timers.target. Oct 2 19:13:32.635260 systemd[1]: Listening on dbus.socket. Oct 2 19:13:32.638599 systemd[1]: Starting docker.socket... Oct 2 19:13:32.645950 systemd[1]: Listening on sshd.socket. Oct 2 19:13:32.647217 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:32.648182 systemd[1]: Listening on docker.socket. Oct 2 19:13:32.649393 systemd[1]: Reached target sockets.target. Oct 2 19:13:32.650471 systemd[1]: Reached target basic.target. Oct 2 19:13:32.651653 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:13:32.651763 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:13:32.653967 systemd[1]: Starting containerd.service... Oct 2 19:13:32.666077 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:13:32.669554 systemd[1]: Starting dbus.service... Oct 2 19:13:32.674759 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:13:32.682994 systemd[1]: Starting extend-filesystems.service... Oct 2 19:13:32.684359 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:13:32.686892 systemd[1]: Starting motdgen.service... Oct 2 19:13:32.692558 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:13:32.695934 systemd[1]: Starting prepare-critools.service... Oct 2 19:13:32.697385 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:13:32.698885 systemd[1]: Starting sshd-keygen.service... Oct 2 19:13:32.703363 systemd[1]: Starting systemd-logind.service... Oct 2 19:13:32.704591 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:13:32.704682 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:13:32.705138 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:13:32.707816 systemd[1]: Starting update-engine.service... Oct 2 19:13:32.709489 jq[1034]: false Oct 2 19:13:32.710575 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:13:32.713145 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:13:32.713355 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:13:32.732288 jq[1043]: true Oct 2 19:13:32.740373 tar[1045]: ./ Oct 2 19:13:32.740373 tar[1045]: ./loopback Oct 2 19:13:32.739500 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:13:32.739692 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:13:32.756528 tar[1046]: crictl Oct 2 19:13:32.779545 jq[1050]: true Oct 2 19:13:32.789183 extend-filesystems[1035]: Found vda Oct 2 19:13:32.794479 extend-filesystems[1035]: Found vda1 Oct 2 19:13:32.795888 extend-filesystems[1035]: Found vda2 Oct 2 19:13:32.796537 systemd[1]: Created slice system-sshd.slice. Oct 2 19:13:32.796723 extend-filesystems[1035]: Found vda3 Oct 2 19:13:32.798200 extend-filesystems[1035]: Found usr Oct 2 19:13:32.798200 extend-filesystems[1035]: Found vda4 Oct 2 19:13:32.798200 extend-filesystems[1035]: Found vda6 Oct 2 19:13:32.798200 extend-filesystems[1035]: Found vda7 Oct 2 19:13:32.798200 extend-filesystems[1035]: Found vda9 Oct 2 19:13:32.798200 extend-filesystems[1035]: Checking size of /dev/vda9 Oct 2 19:13:32.807768 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:13:32.807939 systemd[1]: Finished motdgen.service. Oct 2 19:13:32.824592 dbus-daemon[1031]: [system] SELinux support is enabled Oct 2 19:13:32.824787 systemd[1]: Started dbus.service. Oct 2 19:13:32.827786 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:13:32.827816 systemd[1]: Reached target system-config.target. Oct 2 19:13:32.828318 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:13:32.828343 systemd[1]: Reached target user-config.target. Oct 2 19:13:32.865029 update_engine[1042]: I1002 19:13:32.863857 1042 main.cc:92] Flatcar Update Engine starting Oct 2 19:13:32.868712 extend-filesystems[1035]: Resized partition /dev/vda9 Oct 2 19:13:32.872156 systemd[1]: Started update-engine.service. Oct 2 19:13:32.874328 update_engine[1042]: I1002 19:13:32.872215 1042 update_check_scheduler.cc:74] Next update check in 6m36s Oct 2 19:13:32.876288 systemd[1]: Started locksmithd.service. Oct 2 19:13:32.878308 bash[1084]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:13:32.879158 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:13:32.883356 extend-filesystems[1089]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:13:32.906291 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Oct 2 19:13:32.922324 systemd-logind[1041]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:13:32.922350 systemd-logind[1041]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:13:32.923208 systemd-logind[1041]: New seat seat0. Oct 2 19:13:32.926185 systemd[1]: Started systemd-logind.service. Oct 2 19:13:32.961262 env[1047]: time="2023-10-02T19:13:32.960457818Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:13:32.972066 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Oct 2 19:13:33.005742 coreos-metadata[1030]: Oct 02 19:13:33.004 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 2 19:13:33.025728 env[1047]: time="2023-10-02T19:13:33.011761428Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:13:33.025866 extend-filesystems[1089]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 2 19:13:33.025866 extend-filesystems[1089]: old_desc_blocks = 1, new_desc_blocks = 3 Oct 2 19:13:33.025866 extend-filesystems[1089]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Oct 2 19:13:33.031694 extend-filesystems[1035]: Resized filesystem in /dev/vda9 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.026480263Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.030534657Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.030576405Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.032268108Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.032312872Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.032338831Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.032353118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.032702 env[1047]: time="2023-10-02T19:13:33.032493220Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.025926 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:13:33.026153 systemd[1]: Finished extend-filesystems.service. Oct 2 19:13:33.033512 env[1047]: time="2023-10-02T19:13:33.033345769Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:13:33.033645 env[1047]: time="2023-10-02T19:13:33.033607711Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:13:33.033753 env[1047]: time="2023-10-02T19:13:33.033737073Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:13:33.033893 env[1047]: time="2023-10-02T19:13:33.033863771Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:13:33.033976 env[1047]: time="2023-10-02T19:13:33.033960152Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:13:33.034352 tar[1045]: ./bandwidth Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051725631Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051805400Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051824506Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051883938Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051905268Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051923702Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.051938751Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052040702Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052059036Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052078152Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052121303Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052141040Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052381361Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:13:33.052788 env[1047]: time="2023-10-02T19:13:33.052506555Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.052948464Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053011973Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053036980Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053103405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053120777Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053140555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053156705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053180289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053199 env[1047]: time="2023-10-02T19:13:33.053199064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053394 env[1047]: time="2023-10-02T19:13:33.053215184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053394 env[1047]: time="2023-10-02T19:13:33.053233609Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053394 env[1047]: time="2023-10-02T19:13:33.053252334Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:13:33.053470 env[1047]: time="2023-10-02T19:13:33.053437952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053470 env[1047]: time="2023-10-02T19:13:33.053458641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053521 env[1047]: time="2023-10-02T19:13:33.053474892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053521 env[1047]: time="2023-10-02T19:13:33.053492134Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:13:33.053521 env[1047]: time="2023-10-02T19:13:33.053512592Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:13:33.053592 env[1047]: time="2023-10-02T19:13:33.053529063Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:13:33.053592 env[1047]: time="2023-10-02T19:13:33.053552237Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:13:33.053645 env[1047]: time="2023-10-02T19:13:33.053595899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:13:33.053956 env[1047]: time="2023-10-02T19:13:33.053879050Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.053964089Z" level=info msg="Connect containerd service" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.054007561Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.054690892Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.054954957Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055004681Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055458562Z" level=info msg="Start subscribing containerd event" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055530537Z" level=info msg="Start recovering state" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055593134Z" level=info msg="Start event monitor" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055607692Z" level=info msg="Start snapshots syncer" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055619133Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:13:33.057241 env[1047]: time="2023-10-02T19:13:33.055627920Z" level=info msg="Start streaming server" Oct 2 19:13:33.055131 systemd[1]: Started containerd.service. Oct 2 19:13:33.076676 env[1047]: time="2023-10-02T19:13:33.075470154Z" level=info msg="containerd successfully booted in 0.135744s" Oct 2 19:13:33.100188 tar[1045]: ./ptp Oct 2 19:13:33.149000 tar[1045]: ./vlan Oct 2 19:13:33.203434 tar[1045]: ./host-device Oct 2 19:13:33.220149 coreos-metadata[1030]: Oct 02 19:13:33.220 INFO Fetch successful Oct 2 19:13:33.220149 coreos-metadata[1030]: Oct 02 19:13:33.220 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:13:33.232389 coreos-metadata[1030]: Oct 02 19:13:33.232 INFO Fetch successful Oct 2 19:13:33.239111 unknown[1030]: wrote ssh authorized keys file for user: core Oct 2 19:13:33.256548 tar[1045]: ./tuning Oct 2 19:13:33.270898 update-ssh-keys[1094]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:13:33.271157 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:13:33.297997 tar[1045]: ./vrf Oct 2 19:13:33.338594 tar[1045]: ./sbr Oct 2 19:13:33.379430 tar[1045]: ./tap Oct 2 19:13:33.425865 tar[1045]: ./dhcp Oct 2 19:13:33.541352 tar[1045]: ./static Oct 2 19:13:33.576140 tar[1045]: ./firewall Oct 2 19:13:33.627534 tar[1045]: ./macvlan Oct 2 19:13:33.676337 tar[1045]: ./dummy Oct 2 19:13:33.722859 tar[1045]: ./bridge Oct 2 19:13:33.807078 tar[1045]: ./ipvlan Oct 2 19:13:33.845448 systemd[1]: Finished prepare-critools.service. Oct 2 19:13:33.857091 tar[1045]: ./portmap Oct 2 19:13:33.895987 tar[1045]: ./host-local Oct 2 19:13:33.943127 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:13:33.953340 locksmithd[1088]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:13:34.825399 sshd_keygen[1059]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:13:34.853631 systemd[1]: Finished sshd-keygen.service. Oct 2 19:13:34.858308 systemd[1]: Starting issuegen.service... Oct 2 19:13:34.861886 systemd[1]: Started sshd@0-172.24.4.229:22-172.24.4.1:39176.service. Oct 2 19:13:34.866136 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:13:34.866318 systemd[1]: Finished issuegen.service. Oct 2 19:13:34.868574 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:13:34.879100 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:13:34.881312 systemd[1]: Started getty@tty1.service. Oct 2 19:13:34.883227 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:13:34.883876 systemd[1]: Reached target getty.target. Oct 2 19:13:34.884405 systemd[1]: Reached target multi-user.target. Oct 2 19:13:34.887015 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:13:34.905567 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:13:34.905764 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:13:34.906970 systemd[1]: Startup finished in 897ms (kernel) + 13.874s (initrd) + 9.550s (userspace) = 24.322s. Oct 2 19:13:35.905878 sshd[1111]: Accepted publickey for core from 172.24.4.1 port 39176 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:35.909000 sshd[1111]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:35.945432 systemd[1]: Created slice user-500.slice. Oct 2 19:13:35.949536 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:13:35.956187 systemd-logind[1041]: New session 1 of user core. Oct 2 19:13:35.974063 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:13:35.977638 systemd[1]: Starting user@500.service... Oct 2 19:13:35.985631 (systemd)[1120]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:36.130201 systemd[1120]: Queued start job for default target default.target. Oct 2 19:13:36.130805 systemd[1120]: Reached target paths.target. Oct 2 19:13:36.130824 systemd[1120]: Reached target sockets.target. Oct 2 19:13:36.130839 systemd[1120]: Reached target timers.target. Oct 2 19:13:36.130853 systemd[1120]: Reached target basic.target. Oct 2 19:13:36.130895 systemd[1120]: Reached target default.target. Oct 2 19:13:36.130923 systemd[1120]: Startup finished in 131ms. Oct 2 19:13:36.132112 systemd[1]: Started user@500.service. Oct 2 19:13:36.135517 systemd[1]: Started session-1.scope. Oct 2 19:13:36.464436 systemd[1]: Started sshd@1-172.24.4.229:22-172.24.4.1:40382.service. Oct 2 19:13:38.000224 sshd[1129]: Accepted publickey for core from 172.24.4.1 port 40382 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:38.003899 sshd[1129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:38.015348 systemd-logind[1041]: New session 2 of user core. Oct 2 19:13:38.016433 systemd[1]: Started session-2.scope. Oct 2 19:13:38.678082 sshd[1129]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:38.686266 systemd[1]: Started sshd@2-172.24.4.229:22-172.24.4.1:40398.service. Oct 2 19:13:38.687602 systemd[1]: sshd@1-172.24.4.229:22-172.24.4.1:40382.service: Deactivated successfully. Oct 2 19:13:38.689424 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:13:38.694162 systemd-logind[1041]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:13:38.697104 systemd-logind[1041]: Removed session 2. Oct 2 19:13:39.941772 sshd[1134]: Accepted publickey for core from 172.24.4.1 port 40398 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:39.944457 sshd[1134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:39.954788 systemd-logind[1041]: New session 3 of user core. Oct 2 19:13:39.956647 systemd[1]: Started session-3.scope. Oct 2 19:13:40.761014 sshd[1134]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:40.768452 systemd[1]: Started sshd@3-172.24.4.229:22-172.24.4.1:40406.service. Oct 2 19:13:40.771375 systemd[1]: sshd@2-172.24.4.229:22-172.24.4.1:40398.service: Deactivated successfully. Oct 2 19:13:40.773122 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:13:40.777022 systemd-logind[1041]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:13:40.780057 systemd-logind[1041]: Removed session 3. Oct 2 19:13:42.288373 sshd[1140]: Accepted publickey for core from 172.24.4.1 port 40406 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:42.290903 sshd[1140]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:42.301117 systemd[1]: Started session-4.scope. Oct 2 19:13:42.301874 systemd-logind[1041]: New session 4 of user core. Oct 2 19:13:42.968528 sshd[1140]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:42.978937 systemd[1]: Started sshd@4-172.24.4.229:22-172.24.4.1:40420.service. Oct 2 19:13:42.980322 systemd[1]: sshd@3-172.24.4.229:22-172.24.4.1:40406.service: Deactivated successfully. Oct 2 19:13:42.981838 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:13:42.986305 systemd-logind[1041]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:13:42.989029 systemd-logind[1041]: Removed session 4. Oct 2 19:13:44.399751 sshd[1146]: Accepted publickey for core from 172.24.4.1 port 40420 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:44.402486 sshd[1146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:44.415353 systemd-logind[1041]: New session 5 of user core. Oct 2 19:13:44.416250 systemd[1]: Started session-5.scope. Oct 2 19:13:44.989406 sudo[1150]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:13:44.989951 sudo[1150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:45.004998 dbus-daemon[1031]: \xd0m\xc01\xc1U: received setenforce notice (enforcing=246140896) Oct 2 19:13:45.009188 sudo[1150]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:45.223476 sshd[1146]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:45.229920 systemd[1]: Started sshd@5-172.24.4.229:22-172.24.4.1:41918.service. Oct 2 19:13:45.233197 systemd[1]: sshd@4-172.24.4.229:22-172.24.4.1:40420.service: Deactivated successfully. Oct 2 19:13:45.234844 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:13:45.238006 systemd-logind[1041]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:13:45.240519 systemd-logind[1041]: Removed session 5. Oct 2 19:13:46.753094 sshd[1153]: Accepted publickey for core from 172.24.4.1 port 41918 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:46.755810 sshd[1153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:46.767078 systemd[1]: Started session-6.scope. Oct 2 19:13:46.768182 systemd-logind[1041]: New session 6 of user core. Oct 2 19:13:47.293090 sudo[1158]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:13:47.294324 sudo[1158]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.301303 sudo[1158]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:47.312958 sudo[1157]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:13:47.313473 sudo[1157]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:47.334319 systemd[1]: Stopping audit-rules.service... Oct 2 19:13:47.335000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:13:47.339431 kernel: kauditd_printk_skb: 134 callbacks suppressed Oct 2 19:13:47.339581 kernel: audit: type=1305 audit(1696274027.335:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:13:47.335000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff205cfca0 a2=420 a3=0 items=0 ppid=1 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:47.344785 auditctl[1161]: No rules Oct 2 19:13:47.361704 kernel: audit: type=1300 audit(1696274027.335:171): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff205cfca0 a2=420 a3=0 items=0 ppid=1 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:47.361869 kernel: audit: type=1327 audit(1696274027.335:171): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:13:47.361926 kernel: audit: type=1131 audit(1696274027.343:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.335000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:13:47.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.345869 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:13:47.346269 systemd[1]: Stopped audit-rules.service. Oct 2 19:13:47.355849 systemd[1]: Starting audit-rules.service... Oct 2 19:13:47.398888 augenrules[1178]: No rules Oct 2 19:13:47.400519 systemd[1]: Finished audit-rules.service. Oct 2 19:13:47.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.403395 sudo[1157]: pam_unix(sudo:session): session closed for user root Oct 2 19:13:47.401000 audit[1157]: USER_END pid=1157 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.420285 kernel: audit: type=1130 audit(1696274027.399:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.420409 kernel: audit: type=1106 audit(1696274027.401:174): pid=1157 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.420474 kernel: audit: type=1104 audit(1696274027.401:175): pid=1157 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.401000 audit[1157]: CRED_DISP pid=1157 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.579171 sshd[1153]: pam_unix(sshd:session): session closed for user core Oct 2 19:13:47.585072 systemd[1]: sshd@5-172.24.4.229:22-172.24.4.1:41918.service: Deactivated successfully. Oct 2 19:13:47.600928 kernel: audit: type=1106 audit(1696274027.579:176): pid=1153 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:47.579000 audit[1153]: USER_END pid=1153 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:47.586370 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:13:47.597920 systemd[1]: Started sshd@6-172.24.4.229:22-172.24.4.1:41934.service. Oct 2 19:13:47.580000 audit[1153]: CRED_DISP pid=1153 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:47.604016 systemd-logind[1041]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:13:47.613729 kernel: audit: type=1104 audit(1696274027.580:177): pid=1153 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:47.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.229:22-172.24.4.1:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.614454 systemd-logind[1041]: Removed session 6. Oct 2 19:13:47.623766 kernel: audit: type=1131 audit(1696274027.583:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.229:22-172.24.4.1:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.229:22-172.24.4.1:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:48.829000 audit[1184]: USER_ACCT pid=1184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:48.832005 sshd[1184]: Accepted publickey for core from 172.24.4.1 port 41934 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:13:48.832000 audit[1184]: CRED_ACQ pid=1184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:48.832000 audit[1184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b764810 a2=3 a3=0 items=0 ppid=1 pid=1184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:48.832000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:13:48.835282 sshd[1184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:13:48.845894 systemd-logind[1041]: New session 7 of user core. Oct 2 19:13:48.846722 systemd[1]: Started session-7.scope. Oct 2 19:13:48.861000 audit[1184]: USER_START pid=1184 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:48.865000 audit[1186]: CRED_ACQ pid=1186 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:13:49.290000 audit[1187]: USER_ACCT pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.292988 sudo[1187]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:13:49.292000 audit[1187]: CRED_REFR pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.294218 sudo[1187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:13:49.297000 audit[1187]: USER_START pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:13:50.357311 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:13:50.371319 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:13:50.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:50.372283 systemd[1]: Reached target network-online.target. Oct 2 19:13:50.375544 systemd[1]: Starting docker.service... Oct 2 19:13:50.455097 env[1203]: time="2023-10-02T19:13:50.455008754Z" level=info msg="Starting up" Oct 2 19:13:50.457924 env[1203]: time="2023-10-02T19:13:50.457863698Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:13:50.458092 env[1203]: time="2023-10-02T19:13:50.458056079Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:13:50.458298 env[1203]: time="2023-10-02T19:13:50.458254070Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:13:50.458440 env[1203]: time="2023-10-02T19:13:50.458409171Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:13:50.466922 env[1203]: time="2023-10-02T19:13:50.466873837Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:13:50.467976 env[1203]: time="2023-10-02T19:13:50.467916863Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:13:50.468174 env[1203]: time="2023-10-02T19:13:50.468133660Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:13:50.468332 env[1203]: time="2023-10-02T19:13:50.468298689Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:13:50.478817 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3233681369-merged.mount: Deactivated successfully. Oct 2 19:13:50.519984 env[1203]: time="2023-10-02T19:13:50.519887354Z" level=info msg="Loading containers: start." Oct 2 19:13:50.653000 audit[1233]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.653000 audit[1233]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffef18b9240 a2=0 a3=7ffef18b922c items=0 ppid=1203 pid=1233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:13:50.658000 audit[1235]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.658000 audit[1235]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe611d64f0 a2=0 a3=7ffe611d64dc items=0 ppid=1203 pid=1235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:13:50.663000 audit[1237]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.663000 audit[1237]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca19a3cf0 a2=0 a3=7ffca19a3cdc items=0 ppid=1203 pid=1237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:13:50.667000 audit[1239]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.667000 audit[1239]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdae6bcdf0 a2=0 a3=7ffdae6bcddc items=0 ppid=1203 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:13:50.673000 audit[1241]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.673000 audit[1241]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcbd3ebb0 a2=0 a3=7ffdcbd3eb9c items=0 ppid=1203 pid=1241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:13:50.697000 audit[1246]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.697000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff3dbb960 a2=0 a3=7ffff3dbb94c items=0 ppid=1203 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.697000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:13:50.718000 audit[1249]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.718000 audit[1249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef0e926c0 a2=0 a3=7ffef0e926ac items=0 ppid=1203 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.718000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:13:50.723000 audit[1251]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.723000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffb307d490 a2=0 a3=7fffb307d47c items=0 ppid=1203 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:13:50.727000 audit[1253]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.727000 audit[1253]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffef8732570 a2=0 a3=7ffef873255c items=0 ppid=1203 pid=1253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:13:50.747000 audit[1257]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.747000 audit[1257]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd15e18620 a2=0 a3=7ffd15e1860c items=0 ppid=1203 pid=1257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:13:50.749000 audit[1258]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.749000 audit[1258]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe970d5380 a2=0 a3=7ffe970d536c items=0 ppid=1203 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:13:50.772733 kernel: Initializing XFRM netlink socket Oct 2 19:13:50.844064 env[1203]: time="2023-10-02T19:13:50.844005928Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:13:50.879000 audit[1266]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.879000 audit[1266]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff6c7c4e10 a2=0 a3=7fff6c7c4dfc items=0 ppid=1203 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:13:50.900000 audit[1269]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.900000 audit[1269]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe84bcd130 a2=0 a3=7ffe84bcd11c items=0 ppid=1203 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:13:50.903000 audit[1272]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.903000 audit[1272]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb895a010 a2=0 a3=7ffdb8959ffc items=0 ppid=1203 pid=1272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:13:50.906000 audit[1274]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.906000 audit[1274]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff49a22c50 a2=0 a3=7fff49a22c3c items=0 ppid=1203 pid=1274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:13:50.910000 audit[1276]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.910000 audit[1276]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd319672d0 a2=0 a3=7ffd319672bc items=0 ppid=1203 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.910000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:13:50.914000 audit[1278]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.914000 audit[1278]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd5b9a1690 a2=0 a3=7ffd5b9a167c items=0 ppid=1203 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:13:50.917000 audit[1280]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.917000 audit[1280]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdaae46f70 a2=0 a3=7ffdaae46f5c items=0 ppid=1203 pid=1280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:13:50.930000 audit[1283]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.930000 audit[1283]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff9dc8d920 a2=0 a3=7fff9dc8d90c items=0 ppid=1203 pid=1283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:13:50.934000 audit[1285]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.934000 audit[1285]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffec2af9c50 a2=0 a3=7ffec2af9c3c items=0 ppid=1203 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:13:50.938000 audit[1287]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.938000 audit[1287]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd6322fb0 a2=0 a3=7ffcd6322f9c items=0 ppid=1203 pid=1287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.938000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:13:50.942000 audit[1289]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.942000 audit[1289]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffea32eeae0 a2=0 a3=7ffea32eeacc items=0 ppid=1203 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.942000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:13:50.945479 systemd-networkd[973]: docker0: Link UP Oct 2 19:13:50.957000 audit[1293]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.957000 audit[1293]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcce62fb00 a2=0 a3=7ffcce62faec items=0 ppid=1203 pid=1293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:13:50.959000 audit[1294]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:13:50.959000 audit[1294]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc9b434a30 a2=0 a3=7ffc9b434a1c items=0 ppid=1203 pid=1294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:13:50.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:13:50.961922 env[1203]: time="2023-10-02T19:13:50.961886042Z" level=info msg="Loading containers: done." Oct 2 19:13:50.979104 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1207800614-merged.mount: Deactivated successfully. Oct 2 19:13:50.995274 env[1203]: time="2023-10-02T19:13:50.995239597Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:13:50.995592 env[1203]: time="2023-10-02T19:13:50.995574585Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:13:50.995821 env[1203]: time="2023-10-02T19:13:50.995793506Z" level=info msg="Daemon has completed initialization" Oct 2 19:13:51.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:51.030554 systemd[1]: Started docker.service. Oct 2 19:13:51.055323 env[1203]: time="2023-10-02T19:13:51.055140090Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:13:51.096948 systemd[1]: Reloading. Oct 2 19:13:51.231174 /usr/lib/systemd/system-generators/torcx-generator[1341]: time="2023-10-02T19:13:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:13:51.231208 /usr/lib/systemd/system-generators/torcx-generator[1341]: time="2023-10-02T19:13:51Z" level=info msg="torcx already run" Oct 2 19:13:51.315420 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:13:51.315441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:13:51.338348 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit: BPF prog-id=37 op=LOAD Oct 2 19:13:51.413000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit: BPF prog-id=38 op=LOAD Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.414000 audit: BPF prog-id=39 op=LOAD Oct 2 19:13:51.414000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:13:51.414000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.417000 audit: BPF prog-id=40 op=LOAD Oct 2 19:13:51.418000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.418000 audit: BPF prog-id=41 op=LOAD Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.419000 audit: BPF prog-id=42 op=LOAD Oct 2 19:13:51.420000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:13:51.420000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.421000 audit: BPF prog-id=43 op=LOAD Oct 2 19:13:51.422000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.424000 audit: BPF prog-id=44 op=LOAD Oct 2 19:13:51.424000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.425000 audit: BPF prog-id=45 op=LOAD Oct 2 19:13:51.426000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.426000 audit: BPF prog-id=46 op=LOAD Oct 2 19:13:51.427000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.428000 audit: BPF prog-id=47 op=LOAD Oct 2 19:13:51.429000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit: BPF prog-id=48 op=LOAD Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.429000 audit: BPF prog-id=49 op=LOAD Oct 2 19:13:51.430000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:13:51.430000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.431000 audit: BPF prog-id=50 op=LOAD Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:13:51.432000 audit: BPF prog-id=51 op=LOAD Oct 2 19:13:51.432000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:13:51.432000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:13:51.449451 systemd[1]: Started kubelet.service. Oct 2 19:13:51.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:51.516314 kubelet[1387]: E1002 19:13:51.516173 1387 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:13:51.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:13:51.518411 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:13:51.518530 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:13:52.183760 env[1047]: time="2023-10-02T19:13:52.183632537Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:13:53.032117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount378591902.mount: Deactivated successfully. Oct 2 19:13:55.943888 env[1047]: time="2023-10-02T19:13:55.943626405Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:13:55.947796 env[1047]: time="2023-10-02T19:13:55.947740000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:13:55.950858 env[1047]: time="2023-10-02T19:13:55.950797434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:13:55.954883 env[1047]: time="2023-10-02T19:13:55.954834265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:13:55.957497 env[1047]: time="2023-10-02T19:13:55.957431787Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:13:55.973557 env[1047]: time="2023-10-02T19:13:55.973500834Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:14:00.154140 env[1047]: time="2023-10-02T19:14:00.154074129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:00.156635 env[1047]: time="2023-10-02T19:14:00.156580119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:00.159269 env[1047]: time="2023-10-02T19:14:00.159245928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:00.162438 env[1047]: time="2023-10-02T19:14:00.162416274Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:00.164297 env[1047]: time="2023-10-02T19:14:00.164238111Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:14:00.178858 env[1047]: time="2023-10-02T19:14:00.178806003Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:14:01.643181 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:14:01.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.643517 systemd[1]: Stopped kubelet.service. Oct 2 19:14:01.645911 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 19:14:01.646069 kernel: audit: type=1130 audit(1696274041.641:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.653713 kernel: audit: type=1131 audit(1696274041.647:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.654588 systemd[1]: Started kubelet.service. Oct 2 19:14:01.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.660963 kernel: audit: type=1130 audit(1696274041.655:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:01.734834 kubelet[1417]: E1002 19:14:01.734776 1417 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:14:01.738245 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:14:01.738468 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:14:01.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:14:01.744690 kernel: audit: type=1131 audit(1696274041.737:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:14:02.286524 env[1047]: time="2023-10-02T19:14:02.286469656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:02.296027 env[1047]: time="2023-10-02T19:14:02.295964784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:02.297714 env[1047]: time="2023-10-02T19:14:02.297684529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:02.300173 env[1047]: time="2023-10-02T19:14:02.300117051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:02.301790 env[1047]: time="2023-10-02T19:14:02.301749213Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:14:02.317207 env[1047]: time="2023-10-02T19:14:02.317165185Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:14:04.174508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1745235306.mount: Deactivated successfully. Oct 2 19:14:05.040577 env[1047]: time="2023-10-02T19:14:05.040463507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.043918 env[1047]: time="2023-10-02T19:14:05.043866239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.046366 env[1047]: time="2023-10-02T19:14:05.046315426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.049200 env[1047]: time="2023-10-02T19:14:05.049145985Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.049829 env[1047]: time="2023-10-02T19:14:05.049776068Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:14:05.063885 env[1047]: time="2023-10-02T19:14:05.063822261Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:14:05.921623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount460977124.mount: Deactivated successfully. Oct 2 19:14:05.932963 env[1047]: time="2023-10-02T19:14:05.932889159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.936689 env[1047]: time="2023-10-02T19:14:05.936589765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.940877 env[1047]: time="2023-10-02T19:14:05.940813241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.944178 env[1047]: time="2023-10-02T19:14:05.944116796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:05.945971 env[1047]: time="2023-10-02T19:14:05.945899841Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:14:05.966066 env[1047]: time="2023-10-02T19:14:05.966004403Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:14:11.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:11.890225 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:14:11.905176 kernel: audit: type=1130 audit(1696274051.889:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:11.905253 kernel: audit: type=1131 audit(1696274051.889:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:11.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:11.890492 systemd[1]: Stopped kubelet.service. Oct 2 19:14:11.904587 systemd[1]: Started kubelet.service. Oct 2 19:14:11.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:11.922692 kernel: audit: type=1130 audit(1696274051.904:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:12.035387 kubelet[1439]: E1002 19:14:12.035315 1439 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:14:12.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:14:12.037912 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:14:12.038047 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:14:12.041714 kernel: audit: type=1131 audit(1696274052.037:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:14:14.147366 env[1047]: time="2023-10-02T19:14:14.147188947Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:14.152475 env[1047]: time="2023-10-02T19:14:14.152393050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:14.157802 env[1047]: time="2023-10-02T19:14:14.157734070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:14.163131 env[1047]: time="2023-10-02T19:14:14.163039512Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:14.165889 env[1047]: time="2023-10-02T19:14:14.165817831Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:14:14.192200 env[1047]: time="2023-10-02T19:14:14.192099121Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:14:15.008950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3381200585.mount: Deactivated successfully. Oct 2 19:14:16.217449 env[1047]: time="2023-10-02T19:14:16.217366148Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:16.270293 env[1047]: time="2023-10-02T19:14:16.270079873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:16.343438 env[1047]: time="2023-10-02T19:14:16.341885468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:16.482003 env[1047]: time="2023-10-02T19:14:16.481228701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:16.484007 env[1047]: time="2023-10-02T19:14:16.483943596Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:14:18.613376 update_engine[1042]: I1002 19:14:18.612823 1042 update_attempter.cc:505] Updating boot flags... Oct 2 19:14:21.514467 systemd[1]: Stopped kubelet.service. Oct 2 19:14:21.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:21.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:21.523038 kernel: audit: type=1130 audit(1696274061.515:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:21.523230 kernel: audit: type=1131 audit(1696274061.515:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:21.545445 systemd[1]: Reloading. Oct 2 19:14:21.676033 /usr/lib/systemd/system-generators/torcx-generator[1551]: time="2023-10-02T19:14:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:14:21.676445 /usr/lib/systemd/system-generators/torcx-generator[1551]: time="2023-10-02T19:14:21Z" level=info msg="torcx already run" Oct 2 19:14:21.767072 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:14:21.767601 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:14:21.791094 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.876701 kernel: audit: type=1400 audit(1696274061.866:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.902177 kernel: audit: type=1400 audit(1696274061.866:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.902243 kernel: audit: type=1400 audit(1696274061.866:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.902268 kernel: audit: type=1400 audit(1696274061.866:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.902297 kernel: audit: type=1400 audit(1696274061.866:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.927787 kernel: audit: type=1400 audit(1696274061.866:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.927846 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:14:21.927871 kernel: audit: type=1400 audit(1696274061.866:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit: BPF prog-id=52 op=LOAD Oct 2 19:14:21.875000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit: BPF prog-id=53 op=LOAD Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.875000 audit: BPF prog-id=54 op=LOAD Oct 2 19:14:21.875000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:14:21.875000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit: BPF prog-id=55 op=LOAD Oct 2 19:14:21.893000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit: BPF prog-id=56 op=LOAD Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.910000 audit: BPF prog-id=57 op=LOAD Oct 2 19:14:21.910000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:14:21.910000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:14:21.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.929000 audit: BPF prog-id=58 op=LOAD Oct 2 19:14:21.929000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.931000 audit: BPF prog-id=59 op=LOAD Oct 2 19:14:21.932000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit: BPF prog-id=60 op=LOAD Oct 2 19:14:21.933000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.934000 audit: BPF prog-id=61 op=LOAD Oct 2 19:14:21.934000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.935000 audit: BPF prog-id=62 op=LOAD Oct 2 19:14:21.936000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit: BPF prog-id=63 op=LOAD Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.937000 audit: BPF prog-id=64 op=LOAD Oct 2 19:14:21.937000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:14:21.937000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit: BPF prog-id=65 op=LOAD Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:21.939000 audit: BPF prog-id=66 op=LOAD Oct 2 19:14:21.940000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:14:21.940000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:14:21.963356 systemd[1]: Started kubelet.service. Oct 2 19:14:21.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:22.030094 kubelet[1598]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:14:22.030094 kubelet[1598]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:14:22.030094 kubelet[1598]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:14:22.030094 kubelet[1598]: I1002 19:14:22.026486 1598 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:14:22.388267 kubelet[1598]: I1002 19:14:22.381475 1598 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:14:22.388267 kubelet[1598]: I1002 19:14:22.381509 1598 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:14:22.388267 kubelet[1598]: I1002 19:14:22.381781 1598 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:14:22.389509 kubelet[1598]: I1002 19:14:22.389456 1598 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:14:22.392791 kubelet[1598]: E1002 19:14:22.392745 1598 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.229:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.398220 kubelet[1598]: I1002 19:14:22.398153 1598 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:14:22.398399 kubelet[1598]: I1002 19:14:22.398363 1598 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:14:22.398982 kubelet[1598]: I1002 19:14:22.398934 1598 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:14:22.398982 kubelet[1598]: I1002 19:14:22.398969 1598 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:14:22.398982 kubelet[1598]: I1002 19:14:22.398981 1598 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:14:22.399383 kubelet[1598]: I1002 19:14:22.399107 1598 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:14:22.399383 kubelet[1598]: I1002 19:14:22.399192 1598 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:14:22.399383 kubelet[1598]: I1002 19:14:22.399209 1598 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:14:22.399383 kubelet[1598]: I1002 19:14:22.399236 1598 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:14:22.399383 kubelet[1598]: I1002 19:14:22.399253 1598 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:14:22.400899 kubelet[1598]: W1002 19:14:22.400823 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.229:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.400899 kubelet[1598]: E1002 19:14:22.400897 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.229:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.401105 kubelet[1598]: W1002 19:14:22.400959 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.401105 kubelet[1598]: E1002 19:14:22.400995 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.401105 kubelet[1598]: I1002 19:14:22.401086 1598 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:14:22.401400 kubelet[1598]: W1002 19:14:22.401362 1598 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:14:22.401965 kubelet[1598]: I1002 19:14:22.401931 1598 server.go:1232] "Started kubelet" Oct 2 19:14:22.403810 kubelet[1598]: I1002 19:14:22.403776 1598 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:14:22.405436 kubelet[1598]: I1002 19:14:22.405396 1598 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:14:22.409216 kubelet[1598]: I1002 19:14:22.409175 1598 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:14:22.409471 kubelet[1598]: I1002 19:14:22.409433 1598 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:14:22.410000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:22.410000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:22.410000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c75320 a1=c000a85428 a2=c000c752f0 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.410000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:22.410000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:22.410000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:22.410000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d3eb00 a1=c000a85440 a2=c000c753b0 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.410000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:22.411646 kubelet[1598]: I1002 19:14:22.410830 1598 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:14:22.411646 kubelet[1598]: I1002 19:14:22.410886 1598 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:14:22.411646 kubelet[1598]: I1002 19:14:22.410959 1598 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:14:22.415921 kubelet[1598]: E1002 19:14:22.415589 1598 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-0-b-c273fa9e33.novalocal.178a6045c32cbcf1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-0-b-c273fa9e33.novalocal", UID:"ci-3510-3-0-b-c273fa9e33.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-0-b-c273fa9e33.novalocal"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 14, 22, 401912049, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 14, 22, 401912049, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-0-b-c273fa9e33.novalocal"}': 'Post "https://172.24.4.229:6443/api/v1/namespaces/default/events": dial tcp 172.24.4.229:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:14:22.417159 kubelet[1598]: E1002 19:14:22.417121 1598 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:14:22.417344 kubelet[1598]: E1002 19:14:22.417321 1598 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:14:22.427601 kubelet[1598]: I1002 19:14:22.427545 1598 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:14:22.428702 kubelet[1598]: I1002 19:14:22.428629 1598 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:14:22.428818 kubelet[1598]: I1002 19:14:22.428729 1598 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:14:22.430434 kubelet[1598]: W1002 19:14:22.430369 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.229:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.430434 kubelet[1598]: E1002 19:14:22.430423 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.229:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.430627 kubelet[1598]: E1002 19:14:22.430504 1598 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.229:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-b-c273fa9e33.novalocal?timeout=10s\": dial tcp 172.24.4.229:6443: connect: connection refused" interval="200ms" Oct 2 19:14:22.431000 audit[1609]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.431000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff252e2220 a2=0 a3=7fff252e220c items=0 ppid=1598 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:14:22.434000 audit[1610]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.434000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbe2080e0 a2=0 a3=7ffcbe2080cc items=0 ppid=1598 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:14:22.439000 audit[1612]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.439000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe9c680060 a2=0 a3=7ffe9c68004c items=0 ppid=1598 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:14:22.445000 audit[1614]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.445000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd5f218c10 a2=0 a3=7ffd5f218bfc items=0 ppid=1598 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:14:22.512291 kubelet[1598]: I1002 19:14:22.512228 1598 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:14:22.512617 kubelet[1598]: I1002 19:14:22.512593 1598 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:14:22.513004 kubelet[1598]: I1002 19:14:22.512978 1598 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:14:22.531850 kubelet[1598]: I1002 19:14:22.531797 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.534849 kubelet[1598]: E1002 19:14:22.534767 1598 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.229:6443/api/v1/nodes\": dial tcp 172.24.4.229:6443: connect: connection refused" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.580902 kubelet[1598]: I1002 19:14:22.580468 1598 policy_none.go:49] "None policy: Start" Oct 2 19:14:22.583896 kubelet[1598]: I1002 19:14:22.583840 1598 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:14:22.584055 kubelet[1598]: I1002 19:14:22.583930 1598 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:14:22.584000 audit[1622]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.584000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe412b38c0 a2=0 a3=7ffe412b38ac items=0 ppid=1598 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:14:22.586532 kubelet[1598]: I1002 19:14:22.586488 1598 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:14:22.588000 audit[1624]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:22.588000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9a45d610 a2=0 a3=7ffd9a45d5fc items=0 ppid=1598 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:14:22.590026 kubelet[1598]: I1002 19:14:22.589959 1598 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:14:22.590157 kubelet[1598]: I1002 19:14:22.590038 1598 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:14:22.590157 kubelet[1598]: I1002 19:14:22.590097 1598 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:14:22.590296 kubelet[1598]: E1002 19:14:22.590242 1598 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:14:22.597888 kubelet[1598]: W1002 19:14:22.597783 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.597888 kubelet[1598]: E1002 19:14:22.597894 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:22.597000 audit[1625]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.597000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8d55d730 a2=0 a3=7ffe8d55d71c items=0 ppid=1598 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:14:22.603522 systemd[1]: Created slice kubepods.slice. Oct 2 19:14:22.609000 audit[1626]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:22.609000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeea749320 a2=0 a3=7ffeea74930c items=0 ppid=1598 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:14:22.614929 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:14:22.623582 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:14:22.624000 audit[1627]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.624000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb795c010 a2=0 a3=7fffb795bffc items=0 ppid=1598 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:14:22.628000 audit[1628]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:22.628000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcf58289f0 a2=0 a3=7ffcf58289dc items=0 ppid=1598 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:14:22.631398 kubelet[1598]: E1002 19:14:22.631331 1598 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.229:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-b-c273fa9e33.novalocal?timeout=10s\": dial tcp 172.24.4.229:6443: connect: connection refused" interval="400ms" Oct 2 19:14:22.631000 audit[1630]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:22.631000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff08d935a0 a2=0 a3=7fff08d9358c items=0 ppid=1598 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:14:22.631000 audit[1629]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:22.631000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2aa245f0 a2=0 a3=10e3 items=0 ppid=1598 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:14:22.633965 kubelet[1598]: I1002 19:14:22.633927 1598 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:14:22.633000 audit[1598]: AVC avc: denied { mac_admin } for pid=1598 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:22.633000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:22.633000 audit[1598]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f01920 a1=c000f52a68 a2=c000f018f0 a3=25 items=0 ppid=1 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:22.633000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:22.634224 kubelet[1598]: I1002 19:14:22.634152 1598 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:14:22.635463 kubelet[1598]: I1002 19:14:22.635063 1598 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:14:22.636826 kubelet[1598]: E1002 19:14:22.636805 1598 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:22.691406 kubelet[1598]: I1002 19:14:22.691347 1598 topology_manager.go:215] "Topology Admit Handler" podUID="3c150e785d0845642643a3ecbd4a16f3" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.693115 kubelet[1598]: I1002 19:14:22.693074 1598 topology_manager.go:215] "Topology Admit Handler" podUID="91eb0a70f523b8a8c8d673ed3c10ecf4" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.694153 kubelet[1598]: I1002 19:14:22.694124 1598 topology_manager.go:215] "Topology Admit Handler" podUID="1b27ba22216f190038165ef2cbecc636" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.703907 systemd[1]: Created slice kubepods-burstable-pod3c150e785d0845642643a3ecbd4a16f3.slice. Oct 2 19:14:22.716819 systemd[1]: Created slice kubepods-burstable-pod91eb0a70f523b8a8c8d673ed3c10ecf4.slice. Oct 2 19:14:22.722576 systemd[1]: Created slice kubepods-burstable-pod1b27ba22216f190038165ef2cbecc636.slice. Oct 2 19:14:22.737201 kubelet[1598]: I1002 19:14:22.737171 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.738034 kubelet[1598]: E1002 19:14:22.738010 1598 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.229:6443/api/v1/nodes\": dial tcp 172.24.4.229:6443: connect: connection refused" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.829823 kubelet[1598]: I1002 19:14:22.829756 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.830244 kubelet[1598]: I1002 19:14:22.830214 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.830559 kubelet[1598]: I1002 19:14:22.830532 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.830872 kubelet[1598]: I1002 19:14:22.830846 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.831122 kubelet[1598]: I1002 19:14:22.831096 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.831361 kubelet[1598]: I1002 19:14:22.831335 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.831601 kubelet[1598]: I1002 19:14:22.831575 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/91eb0a70f523b8a8c8d673ed3c10ecf4-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"91eb0a70f523b8a8c8d673ed3c10ecf4\") " pod="kube-system/kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.831878 kubelet[1598]: I1002 19:14:22.831851 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:22.832113 kubelet[1598]: I1002 19:14:22.832088 1598 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:23.016558 env[1047]: time="2023-10-02T19:14:23.016272592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:3c150e785d0845642643a3ecbd4a16f3,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:23.024215 env[1047]: time="2023-10-02T19:14:23.023250979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:91eb0a70f523b8a8c8d673ed3c10ecf4,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:23.027350 env[1047]: time="2023-10-02T19:14:23.027051348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:1b27ba22216f190038165ef2cbecc636,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:23.034056 kubelet[1598]: E1002 19:14:23.033991 1598 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.229:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-b-c273fa9e33.novalocal?timeout=10s\": dial tcp 172.24.4.229:6443: connect: connection refused" interval="800ms" Oct 2 19:14:23.141730 kubelet[1598]: I1002 19:14:23.141501 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:23.142612 kubelet[1598]: E1002 19:14:23.142556 1598 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.229:6443/api/v1/nodes\": dial tcp 172.24.4.229:6443: connect: connection refused" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:23.255588 kubelet[1598]: W1002 19:14:23.255428 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.255588 kubelet[1598]: E1002 19:14:23.255597 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.673860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount99662942.mount: Deactivated successfully. Oct 2 19:14:23.684364 env[1047]: time="2023-10-02T19:14:23.684255549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.690038 env[1047]: time="2023-10-02T19:14:23.689946003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.693277 env[1047]: time="2023-10-02T19:14:23.693208690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.696620 env[1047]: time="2023-10-02T19:14:23.696534175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.701464 env[1047]: time="2023-10-02T19:14:23.701375191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.709460 env[1047]: time="2023-10-02T19:14:23.709397182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.717978 env[1047]: time="2023-10-02T19:14:23.717922017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.719801 env[1047]: time="2023-10-02T19:14:23.719748092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.723737 env[1047]: time="2023-10-02T19:14:23.723707029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.725645 env[1047]: time="2023-10-02T19:14:23.725623975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.726676 env[1047]: time="2023-10-02T19:14:23.726629777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.727745 env[1047]: time="2023-10-02T19:14:23.727725298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:23.785248 kubelet[1598]: W1002 19:14:23.785070 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.229:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.785379 kubelet[1598]: E1002 19:14:23.785265 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.229:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.796952 env[1047]: time="2023-10-02T19:14:23.793981338Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:23.796952 env[1047]: time="2023-10-02T19:14:23.794024459Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:23.796952 env[1047]: time="2023-10-02T19:14:23.794038015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:23.796952 env[1047]: time="2023-10-02T19:14:23.794179431Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/72bdbf0171a254d207b29733e25edbd7dc84bc1ed4a050636aee1f33bc885a41 pid=1638 runtime=io.containerd.runc.v2 Oct 2 19:14:23.823031 env[1047]: time="2023-10-02T19:14:23.822813002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:23.823031 env[1047]: time="2023-10-02T19:14:23.822872944Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:23.823031 env[1047]: time="2023-10-02T19:14:23.822887131Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:23.823423 env[1047]: time="2023-10-02T19:14:23.823383465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/237cc7f28b1799b178ae74f4399c54b1ca939fbda5a1e1c72478c7717217835e pid=1663 runtime=io.containerd.runc.v2 Oct 2 19:14:23.823868 env[1047]: time="2023-10-02T19:14:23.823737511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:23.823952 env[1047]: time="2023-10-02T19:14:23.823863127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:23.823952 env[1047]: time="2023-10-02T19:14:23.823896550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:23.824333 env[1047]: time="2023-10-02T19:14:23.824264883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25946e62dc99bdf334eef32116266f36ce5171a34dfb8b2d52f9f374e19df749 pid=1667 runtime=io.containerd.runc.v2 Oct 2 19:14:23.835151 kubelet[1598]: E1002 19:14:23.835116 1598 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.229:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-b-c273fa9e33.novalocal?timeout=10s\": dial tcp 172.24.4.229:6443: connect: connection refused" interval="1.6s" Oct 2 19:14:23.842606 systemd[1]: Started cri-containerd-72bdbf0171a254d207b29733e25edbd7dc84bc1ed4a050636aee1f33bc885a41.scope. Oct 2 19:14:23.860007 systemd[1]: Started cri-containerd-25946e62dc99bdf334eef32116266f36ce5171a34dfb8b2d52f9f374e19df749.scope. Oct 2 19:14:23.874875 systemd[1]: Started cri-containerd-237cc7f28b1799b178ae74f4399c54b1ca939fbda5a1e1c72478c7717217835e.scope. Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.879000 audit: BPF prog-id=67 op=LOAD Oct 2 19:14:23.881000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.881000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393436653632646339396264663333346565663332313136323636 Oct 2 19:14:23.881000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.881000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393436653632646339396264663333346565663332313136323636 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.882000 audit: BPF prog-id=68 op=LOAD Oct 2 19:14:23.882000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027f3b0 items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393436653632646339396264663333346565663332313136323636 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.883000 audit: BPF prog-id=69 op=LOAD Oct 2 19:14:23.883000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027f3f8 items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393436653632646339396264663333346565663332313136323636 Oct 2 19:14:23.884000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:14:23.884000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.884000 audit: BPF prog-id=70 op=LOAD Oct 2 19:14:23.884000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027f808 items=0 ppid=1667 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393436653632646339396264663333346565663332313136323636 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit: BPF prog-id=71 op=LOAD Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1638 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626462663031373161323534643230376232393733336532356564 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1638 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626462663031373161323534643230376232393733336532356564 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit: BPF prog-id=72 op=LOAD Oct 2 19:14:23.889000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001a8db0 items=0 ppid=1638 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626462663031373161323534643230376232393733336532356564 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.889000 audit: BPF prog-id=73 op=LOAD Oct 2 19:14:23.889000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001a8df8 items=0 ppid=1638 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626462663031373161323534643230376232393733336532356564 Oct 2 19:14:23.890000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:14:23.890000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.890000 audit: BPF prog-id=74 op=LOAD Oct 2 19:14:23.890000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001a9208 items=0 ppid=1638 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732626462663031373161323534643230376232393733336532356564 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit: BPF prog-id=75 op=LOAD Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376363376632386231373939623137386165373466343339396335 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376363376632386231373939623137386165373466343339396335 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit: BPF prog-id=76 op=LOAD Oct 2 19:14:23.900000 audit[1686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002e18f0 items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376363376632386231373939623137386165373466343339396335 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit: BPF prog-id=77 op=LOAD Oct 2 19:14:23.900000 audit[1686]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002e1938 items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376363376632386231373939623137386165373466343339396335 Oct 2 19:14:23.900000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:14:23.900000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { perfmon } for pid=1686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit[1686]: AVC avc: denied { bpf } for pid=1686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:23.900000 audit: BPF prog-id=78 op=LOAD Oct 2 19:14:23.900000 audit[1686]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e1d48 items=0 ppid=1663 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:23.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376363376632386231373939623137386165373466343339396335 Oct 2 19:14:23.906601 kubelet[1598]: W1002 19:14:23.906543 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.906601 kubelet[1598]: E1002 19:14:23.906598 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.946106 env[1047]: time="2023-10-02T19:14:23.939633657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:91eb0a70f523b8a8c8d673ed3c10ecf4,Namespace:kube-system,Attempt:0,} returns sandbox id \"72bdbf0171a254d207b29733e25edbd7dc84bc1ed4a050636aee1f33bc885a41\"" Oct 2 19:14:23.947058 env[1047]: time="2023-10-02T19:14:23.946709416Z" level=info msg="CreateContainer within sandbox \"72bdbf0171a254d207b29733e25edbd7dc84bc1ed4a050636aee1f33bc885a41\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:14:23.947387 kubelet[1598]: I1002 19:14:23.947347 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:23.947749 kubelet[1598]: E1002 19:14:23.947722 1598 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.229:6443/api/v1/nodes\": dial tcp 172.24.4.229:6443: connect: connection refused" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:23.961736 env[1047]: time="2023-10-02T19:14:23.961641294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:1b27ba22216f190038165ef2cbecc636,Namespace:kube-system,Attempt:0,} returns sandbox id \"237cc7f28b1799b178ae74f4399c54b1ca939fbda5a1e1c72478c7717217835e\"" Oct 2 19:14:23.966441 env[1047]: time="2023-10-02T19:14:23.966395346Z" level=info msg="CreateContainer within sandbox \"237cc7f28b1799b178ae74f4399c54b1ca939fbda5a1e1c72478c7717217835e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:14:23.972089 env[1047]: time="2023-10-02T19:14:23.972039022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal,Uid:3c150e785d0845642643a3ecbd4a16f3,Namespace:kube-system,Attempt:0,} returns sandbox id \"25946e62dc99bdf334eef32116266f36ce5171a34dfb8b2d52f9f374e19df749\"" Oct 2 19:14:23.977819 kubelet[1598]: W1002 19:14:23.977787 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.229:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.977952 kubelet[1598]: E1002 19:14:23.977827 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.229:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:23.978357 env[1047]: time="2023-10-02T19:14:23.978326088Z" level=info msg="CreateContainer within sandbox \"25946e62dc99bdf334eef32116266f36ce5171a34dfb8b2d52f9f374e19df749\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:14:23.996981 env[1047]: time="2023-10-02T19:14:23.996935013Z" level=info msg="CreateContainer within sandbox \"72bdbf0171a254d207b29733e25edbd7dc84bc1ed4a050636aee1f33bc885a41\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3ec953a76e937a2acfffc49457131cdf7822c017718517a78fdb11c3e80ddca2\"" Oct 2 19:14:23.997906 env[1047]: time="2023-10-02T19:14:23.997856536Z" level=info msg="StartContainer for \"3ec953a76e937a2acfffc49457131cdf7822c017718517a78fdb11c3e80ddca2\"" Oct 2 19:14:24.009230 env[1047]: time="2023-10-02T19:14:24.009166297Z" level=info msg="CreateContainer within sandbox \"237cc7f28b1799b178ae74f4399c54b1ca939fbda5a1e1c72478c7717217835e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"679e1c5b4a65b5bf6c44990e1ab8f3d5b426b2326adb26fea3992bc3bb8d3e70\"" Oct 2 19:14:24.010025 env[1047]: time="2023-10-02T19:14:24.009989064Z" level=info msg="StartContainer for \"679e1c5b4a65b5bf6c44990e1ab8f3d5b426b2326adb26fea3992bc3bb8d3e70\"" Oct 2 19:14:24.018071 systemd[1]: Started cri-containerd-3ec953a76e937a2acfffc49457131cdf7822c017718517a78fdb11c3e80ddca2.scope. Oct 2 19:14:24.031114 env[1047]: time="2023-10-02T19:14:24.031055424Z" level=info msg="CreateContainer within sandbox \"25946e62dc99bdf334eef32116266f36ce5171a34dfb8b2d52f9f374e19df749\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f329a755ddc36faca05577abbed5317d7a7e3575f690a1547de9593387e17688\"" Oct 2 19:14:24.033099 env[1047]: time="2023-10-02T19:14:24.033046108Z" level=info msg="StartContainer for \"f329a755ddc36faca05577abbed5317d7a7e3575f690a1547de9593387e17688\"" Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.041000 audit: BPF prog-id=79 op=LOAD Oct 2 19:14:24.042000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.042000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633935336137366539333761326163666666633439343537313331 Oct 2 19:14:24.042000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.042000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633935336137366539333761326163666666633439343537313331 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.043000 audit: BPF prog-id=80 op=LOAD Oct 2 19:14:24.043000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da310 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633935336137366539333761326163666666633439343537313331 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.044000 audit: BPF prog-id=81 op=LOAD Oct 2 19:14:24.044000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da358 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633935336137366539333761326163666666633439343537313331 Oct 2 19:14:24.044000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:14:24.044000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.045000 audit: BPF prog-id=82 op=LOAD Oct 2 19:14:24.045000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da768 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633935336137366539333761326163666666633439343537313331 Oct 2 19:14:24.061999 systemd[1]: Started cri-containerd-679e1c5b4a65b5bf6c44990e1ab8f3d5b426b2326adb26fea3992bc3bb8d3e70.scope. Oct 2 19:14:24.090220 systemd[1]: Started cri-containerd-f329a755ddc36faca05577abbed5317d7a7e3575f690a1547de9593387e17688.scope. Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.094000 audit: BPF prog-id=83 op=LOAD Oct 2 19:14:24.095000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.095000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1663 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396531633562346136356235626636633434393930653161623866 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1663 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396531633562346136356235626636633434393930653161623866 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit: BPF prog-id=84 op=LOAD Oct 2 19:14:24.096000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d8ac0 items=0 ppid=1663 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396531633562346136356235626636633434393930653161623866 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit: BPF prog-id=85 op=LOAD Oct 2 19:14:24.096000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d8b08 items=0 ppid=1663 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396531633562346136356235626636633434393930653161623866 Oct 2 19:14:24.096000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:14:24.096000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.096000 audit: BPF prog-id=86 op=LOAD Oct 2 19:14:24.096000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8f18 items=0 ppid=1663 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637396531633562346136356235626636633434393930653161623866 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.110000 audit: BPF prog-id=87 op=LOAD Oct 2 19:14:24.112000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.112000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323961373535646463333666616361303535373761626265643533 Oct 2 19:14:24.112000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.112000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323961373535646463333666616361303535373761626265643533 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.113000 audit: BPF prog-id=88 op=LOAD Oct 2 19:14:24.113000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003bb0c0 items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323961373535646463333666616361303535373761626265643533 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.114000 audit: BPF prog-id=89 op=LOAD Oct 2 19:14:24.114000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003bb108 items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323961373535646463333666616361303535373761626265643533 Oct 2 19:14:24.117000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:14:24.117000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:24.117000 audit: BPF prog-id=90 op=LOAD Oct 2 19:14:24.117000 audit[1797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003bb518 items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:24.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633323961373535646463333666616361303535373761626265643533 Oct 2 19:14:24.124643 env[1047]: time="2023-10-02T19:14:24.124598671Z" level=info msg="StartContainer for \"3ec953a76e937a2acfffc49457131cdf7822c017718517a78fdb11c3e80ddca2\" returns successfully" Oct 2 19:14:24.191580 env[1047]: time="2023-10-02T19:14:24.191515501Z" level=info msg="StartContainer for \"679e1c5b4a65b5bf6c44990e1ab8f3d5b426b2326adb26fea3992bc3bb8d3e70\" returns successfully" Oct 2 19:14:24.193229 env[1047]: time="2023-10-02T19:14:24.193159683Z" level=info msg="StartContainer for \"f329a755ddc36faca05577abbed5317d7a7e3575f690a1547de9593387e17688\" returns successfully" Oct 2 19:14:24.516466 kubelet[1598]: E1002 19:14:24.516433 1598 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.229:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:25.067626 kubelet[1598]: W1002 19:14:25.067545 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:25.068087 kubelet[1598]: E1002 19:14:25.068070 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.229:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-0-b-c273fa9e33.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:25.436222 kubelet[1598]: E1002 19:14:25.436187 1598 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.229:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-0-b-c273fa9e33.novalocal?timeout=10s\": dial tcp 172.24.4.229:6443: connect: connection refused" interval="3.2s" Oct 2 19:14:25.550213 kubelet[1598]: I1002 19:14:25.550187 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:25.550967 kubelet[1598]: E1002 19:14:25.550953 1598 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.229:6443/api/v1/nodes\": dial tcp 172.24.4.229:6443: connect: connection refused" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:25.592000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:25.592000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000840210 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:25.592000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:25.592000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:25.592000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004e2600 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:25.592000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:25.663036 kubelet[1598]: W1002 19:14:25.662962 1598 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:25.663257 kubelet[1598]: E1002 19:14:25.663246 1598 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.229:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.229:6443: connect: connection refused Oct 2 19:14:27.241000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.245402 kernel: kauditd_printk_skb: 571 callbacks suppressed Oct 2 19:14:27.245506 kernel: audit: type=1400 audit(1696274067.241:691): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.242000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=523396 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.266378 kernel: audit: type=1400 audit(1696274067.242:692): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=523396 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.269668 kernel: audit: type=1300 audit(1696274067.242:692): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c000e2e690 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.242000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c000e2e690 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.295398 kernel: audit: type=1327 audit(1696274067.242:692): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.295496 kernel: audit: type=1300 audit(1696274067.241:691): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006818f00 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.241000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006818f00 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.241000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.312690 kernel: audit: type=1327 audit(1696274067.241:691): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.243000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.323831 kernel: audit: type=1400 audit(1696274067.243:693): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.323898 kernel: audit: type=1300 audit(1696274067.243:693): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0067b4960 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.243000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0067b4960 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.337687 kernel: audit: type=1327 audit(1696274067.243:693): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.256000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=523402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.343708 kernel: audit: type=1400 audit(1696274067.256:694): avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=523402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.256000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c000e2ea50 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.329000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.329000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c002ff6200 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.329000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:27.329000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0030c03c0 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:14:27.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:14:27.810408 kubelet[1598]: E1002 19:14:27.810299 1598 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510-3-0-b-c273fa9e33.novalocal" not found Oct 2 19:14:28.190705 kubelet[1598]: E1002 19:14:28.190598 1598 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510-3-0-b-c273fa9e33.novalocal" not found Oct 2 19:14:28.642180 kubelet[1598]: E1002 19:14:28.642127 1598 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:28.650965 kubelet[1598]: E1002 19:14:28.650898 1598 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510-3-0-b-c273fa9e33.novalocal" not found Oct 2 19:14:28.756345 kubelet[1598]: I1002 19:14:28.756298 1598 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:28.771940 kubelet[1598]: I1002 19:14:28.771887 1598 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:28.796399 kubelet[1598]: E1002 19:14:28.796344 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:28.897511 kubelet[1598]: E1002 19:14:28.897364 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:28.997986 kubelet[1598]: E1002 19:14:28.997935 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.098479 kubelet[1598]: E1002 19:14:29.098415 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.199296 kubelet[1598]: E1002 19:14:29.198982 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.300147 kubelet[1598]: E1002 19:14:29.300013 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.401156 kubelet[1598]: E1002 19:14:29.401039 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.502379 kubelet[1598]: E1002 19:14:29.502147 1598 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-0-b-c273fa9e33.novalocal\" not found" Oct 2 19:14:29.797585 kubelet[1598]: W1002 19:14:29.797410 1598 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:30.406238 kubelet[1598]: I1002 19:14:30.406171 1598 apiserver.go:52] "Watching apiserver" Oct 2 19:14:30.429729 kubelet[1598]: I1002 19:14:30.429683 1598 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:14:30.753073 systemd[1]: Reloading. Oct 2 19:14:30.872094 /usr/lib/systemd/system-generators/torcx-generator[1882]: time="2023-10-02T19:14:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:14:30.872126 /usr/lib/systemd/system-generators/torcx-generator[1882]: time="2023-10-02T19:14:30Z" level=info msg="torcx already run" Oct 2 19:14:30.972813 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:14:30.972839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:14:30.996734 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.085000 audit: BPF prog-id=91 op=LOAD Oct 2 19:14:31.085000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit: BPF prog-id=92 op=LOAD Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.087000 audit: BPF prog-id=93 op=LOAD Oct 2 19:14:31.087000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:14:31.087000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.089000 audit: BPF prog-id=94 op=LOAD Oct 2 19:14:31.089000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.090000 audit: BPF prog-id=95 op=LOAD Oct 2 19:14:31.090000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit: BPF prog-id=96 op=LOAD Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit: BPF prog-id=97 op=LOAD Oct 2 19:14:31.091000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:14:31.091000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit: BPF prog-id=98 op=LOAD Oct 2 19:14:31.092000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.092000 audit: BPF prog-id=99 op=LOAD Oct 2 19:14:31.092000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit: BPF prog-id=100 op=LOAD Oct 2 19:14:31.094000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit: BPF prog-id=101 op=LOAD Oct 2 19:14:31.095000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.095000 audit: BPF prog-id=102 op=LOAD Oct 2 19:14:31.095000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.096000 audit: BPF prog-id=103 op=LOAD Oct 2 19:14:31.096000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.097000 audit: BPF prog-id=104 op=LOAD Oct 2 19:14:31.097000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit: BPF prog-id=105 op=LOAD Oct 2 19:14:31.098000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit: BPF prog-id=106 op=LOAD Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit: BPF prog-id=107 op=LOAD Oct 2 19:14:31.099000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:14:31.099000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.099000 audit: BPF prog-id=108 op=LOAD Oct 2 19:14:31.099000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit: BPF prog-id=109 op=LOAD Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.100000 audit: BPF prog-id=110 op=LOAD Oct 2 19:14:31.100000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:14:31.100000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.101000 audit: BPF prog-id=111 op=LOAD Oct 2 19:14:31.102000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:14:31.117786 systemd[1]: Stopping kubelet.service... Oct 2 19:14:31.136903 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:14:31.137118 systemd[1]: Stopped kubelet.service. Oct 2 19:14:31.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:31.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:31.139231 systemd[1]: Started kubelet.service. Oct 2 19:14:31.249730 kubelet[1929]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:14:31.250075 kubelet[1929]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:14:31.250135 kubelet[1929]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:14:31.250342 kubelet[1929]: I1002 19:14:31.250312 1929 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:14:31.261534 kubelet[1929]: I1002 19:14:31.261507 1929 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:14:31.261722 kubelet[1929]: I1002 19:14:31.261710 1929 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:14:31.262035 kubelet[1929]: I1002 19:14:31.262021 1929 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:14:31.265639 kubelet[1929]: I1002 19:14:31.265619 1929 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:14:31.267966 kubelet[1929]: I1002 19:14:31.267946 1929 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:14:31.272910 kubelet[1929]: I1002 19:14:31.272890 1929 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:14:31.273201 kubelet[1929]: I1002 19:14:31.273190 1929 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:14:31.273440 kubelet[1929]: I1002 19:14:31.273425 1929 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:14:31.273577 kubelet[1929]: I1002 19:14:31.273567 1929 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:14:31.273638 kubelet[1929]: I1002 19:14:31.273629 1929 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:14:31.273757 kubelet[1929]: I1002 19:14:31.273746 1929 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:14:31.273889 kubelet[1929]: I1002 19:14:31.273878 1929 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:14:31.273955 kubelet[1929]: I1002 19:14:31.273947 1929 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:14:31.274082 kubelet[1929]: I1002 19:14:31.274073 1929 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:14:31.274148 kubelet[1929]: I1002 19:14:31.274139 1929 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:14:31.279282 kubelet[1929]: I1002 19:14:31.279261 1929 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:14:31.279914 kubelet[1929]: I1002 19:14:31.279901 1929 server.go:1232] "Started kubelet" Oct 2 19:14:31.282000 audit[1929]: AVC avc: denied { mac_admin } for pid=1929 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.282000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:31.282000 audit[1929]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ca6d20 a1=c0009db098 a2=c000ca6cf0 a3=25 items=0 ppid=1 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:31.282000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:31.283963 kubelet[1929]: I1002 19:14:31.283950 1929 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:14:31.283000 audit[1929]: AVC avc: denied { mac_admin } for pid=1929 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.283000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:31.283000 audit[1929]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc8120 a1=c0009db0b0 a2=c000ca6db0 a3=25 items=0 ppid=1 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:31.283000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:31.284342 kubelet[1929]: I1002 19:14:31.284331 1929 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:14:31.284450 kubelet[1929]: I1002 19:14:31.284440 1929 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:14:31.294571 kubelet[1929]: I1002 19:14:31.294539 1929 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:14:31.295508 kubelet[1929]: I1002 19:14:31.295494 1929 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:14:31.296868 kubelet[1929]: I1002 19:14:31.296855 1929 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:14:31.297130 kubelet[1929]: I1002 19:14:31.297114 1929 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:14:31.299898 kubelet[1929]: I1002 19:14:31.299884 1929 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:14:31.301247 kubelet[1929]: I1002 19:14:31.301233 1929 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:14:31.301341 kubelet[1929]: E1002 19:14:31.299910 1929 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:14:31.301442 kubelet[1929]: E1002 19:14:31.301432 1929 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:14:31.301695 kubelet[1929]: I1002 19:14:31.301651 1929 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:14:31.306516 kubelet[1929]: I1002 19:14:31.306497 1929 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:14:31.307438 kubelet[1929]: I1002 19:14:31.307426 1929 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:14:31.307530 kubelet[1929]: I1002 19:14:31.307521 1929 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:14:31.307600 kubelet[1929]: I1002 19:14:31.307591 1929 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:14:31.307757 kubelet[1929]: E1002 19:14:31.307746 1929 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:14:31.413616 kubelet[1929]: E1002 19:14:31.413589 1929 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:14:31.416841 kubelet[1929]: I1002 19:14:31.416816 1929 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.429005 kubelet[1929]: I1002 19:14:31.428969 1929 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:14:31.429005 kubelet[1929]: I1002 19:14:31.428996 1929 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:14:31.429005 kubelet[1929]: I1002 19:14:31.429027 1929 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:14:31.429251 kubelet[1929]: I1002 19:14:31.429225 1929 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:14:31.429251 kubelet[1929]: I1002 19:14:31.429251 1929 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:14:31.429310 kubelet[1929]: I1002 19:14:31.429260 1929 policy_none.go:49] "None policy: Start" Oct 2 19:14:31.430441 kubelet[1929]: I1002 19:14:31.430423 1929 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:14:31.430549 kubelet[1929]: I1002 19:14:31.430537 1929 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:14:31.430872 kubelet[1929]: I1002 19:14:31.430862 1929 state_mem.go:75] "Updated machine memory state" Oct 2 19:14:31.442745 kubelet[1929]: I1002 19:14:31.442467 1929 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.442745 kubelet[1929]: I1002 19:14:31.442553 1929 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.442000 audit[1929]: AVC avc: denied { mac_admin } for pid=1929 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:31.442000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:14:31.442000 audit[1929]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011e6540 a1=c0011cf1d0 a2=c0011e6510 a3=25 items=0 ppid=1 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:31.442000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:14:31.443163 kubelet[1929]: I1002 19:14:31.442872 1929 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:14:31.443163 kubelet[1929]: I1002 19:14:31.442970 1929 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:14:31.443303 kubelet[1929]: I1002 19:14:31.443278 1929 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:14:31.614492 kubelet[1929]: I1002 19:14:31.614442 1929 topology_manager.go:215] "Topology Admit Handler" podUID="3c150e785d0845642643a3ecbd4a16f3" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.614773 kubelet[1929]: I1002 19:14:31.614740 1929 topology_manager.go:215] "Topology Admit Handler" podUID="91eb0a70f523b8a8c8d673ed3c10ecf4" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.615870 kubelet[1929]: I1002 19:14:31.615835 1929 topology_manager.go:215] "Topology Admit Handler" podUID="1b27ba22216f190038165ef2cbecc636" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.635433 kubelet[1929]: W1002 19:14:31.635366 1929 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:31.641139 kubelet[1929]: W1002 19:14:31.641078 1929 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:31.641412 kubelet[1929]: E1002 19:14:31.641373 1929 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.642261 kubelet[1929]: W1002 19:14:31.642227 1929 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:31.704627 kubelet[1929]: I1002 19:14:31.704437 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.708532 kubelet[1929]: I1002 19:14:31.708411 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.709424 kubelet[1929]: I1002 19:14:31.709350 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.710604 kubelet[1929]: I1002 19:14:31.710052 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/91eb0a70f523b8a8c8d673ed3c10ecf4-kubeconfig\") pod \"kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"91eb0a70f523b8a8c8d673ed3c10ecf4\") " pod="kube-system/kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.710873 kubelet[1929]: I1002 19:14:31.710825 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-ca-certs\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.711518 kubelet[1929]: I1002 19:14:31.711470 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-k8s-certs\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.711905 kubelet[1929]: I1002 19:14:31.711859 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1b27ba22216f190038165ef2cbecc636-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"1b27ba22216f190038165ef2cbecc636\") " pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.712024 kubelet[1929]: I1002 19:14:31.711994 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-ca-certs\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:31.712772 kubelet[1929]: I1002 19:14:31.712454 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3c150e785d0845642643a3ecbd4a16f3-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" (UID: \"3c150e785d0845642643a3ecbd4a16f3\") " pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:32.285038 kubelet[1929]: I1002 19:14:32.284991 1929 apiserver.go:52] "Watching apiserver" Oct 2 19:14:32.301491 kubelet[1929]: I1002 19:14:32.301468 1929 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:14:32.410244 kubelet[1929]: W1002 19:14:32.410200 1929 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:32.410870 kubelet[1929]: E1002 19:14:32.410813 1929 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:32.412490 kubelet[1929]: W1002 19:14:32.410542 1929 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:14:32.412708 kubelet[1929]: E1002 19:14:32.412621 1929 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:14:32.442556 kubelet[1929]: I1002 19:14:32.442476 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-0-b-c273fa9e33.novalocal" podStartSLOduration=1.44235999 podCreationTimestamp="2023-10-02 19:14:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:14:32.440073304 +0000 UTC m=+1.294268872" watchObservedRunningTime="2023-10-02 19:14:32.44235999 +0000 UTC m=+1.296555578" Oct 2 19:14:32.497541 kubelet[1929]: I1002 19:14:32.497507 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-0-b-c273fa9e33.novalocal" podStartSLOduration=3.497458208 podCreationTimestamp="2023-10-02 19:14:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:14:32.486780077 +0000 UTC m=+1.340975655" watchObservedRunningTime="2023-10-02 19:14:32.497458208 +0000 UTC m=+1.351653736" Oct 2 19:14:32.519305 kubelet[1929]: I1002 19:14:32.519270 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-0-b-c273fa9e33.novalocal" podStartSLOduration=1.51922045 podCreationTimestamp="2023-10-02 19:14:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:14:32.497915266 +0000 UTC m=+1.352110844" watchObservedRunningTime="2023-10-02 19:14:32.51922045 +0000 UTC m=+1.373415978" Oct 2 19:14:35.444485 sudo[1187]: pam_unix(sudo:session): session closed for user root Oct 2 19:14:35.443000 audit[1187]: USER_END pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:35.446789 kernel: kauditd_printk_skb: 266 callbacks suppressed Oct 2 19:14:35.446860 kernel: audit: type=1106 audit(1696274075.443:946): pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:35.444000 audit[1187]: CRED_DISP pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:35.461153 kernel: audit: type=1104 audit(1696274075.444:947): pid=1187 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:14:35.618811 sshd[1184]: pam_unix(sshd:session): session closed for user core Oct 2 19:14:35.621000 audit[1184]: USER_END pid=1184 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:14:35.634721 kernel: audit: type=1106 audit(1696274075.621:948): pid=1184 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:14:35.635233 systemd[1]: sshd@6-172.24.4.229:22-172.24.4.1:41934.service: Deactivated successfully. Oct 2 19:14:35.637152 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:14:35.637734 systemd[1]: session-7.scope: Consumed 7.403s CPU time. Oct 2 19:14:35.621000 audit[1184]: CRED_DISP pid=1184 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:14:35.641152 systemd-logind[1041]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:14:35.643250 systemd-logind[1041]: Removed session 7. Oct 2 19:14:35.649069 kernel: audit: type=1104 audit(1696274075.621:949): pid=1184 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:14:35.649203 kernel: audit: type=1131 audit(1696274075.635:950): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.229:22-172.24.4.1:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:35.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.229:22-172.24.4.1:41934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:42.426000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.426000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6ac0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.437793 kernel: audit: type=1400 audit(1696274082.426:951): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.437894 kernel: audit: type=1300 audit(1696274082.426:951): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6ac0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.437957 kernel: audit: type=1327 audit(1696274082.426:951): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.426000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.437000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.447552 kernel: audit: type=1400 audit(1696274082.437:952): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.447822 kernel: audit: type=1300 audit(1696274082.437:952): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6c00 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.437000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6c00 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.459702 kernel: audit: type=1327 audit(1696274082.437:952): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.459825 kernel: audit: type=1400 audit(1696274082.442:953): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.442000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.442000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6d40 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.474445 kernel: audit: type=1300 audit(1696274082.442:953): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6d40 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.474633 kernel: audit: type=1327 audit(1696274082.442:953): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.442000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:42.479718 kernel: audit: type=1400 audit(1696274082.442:954): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.442000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:14:42.442000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fc6e80 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:42.442000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:45.394000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=523427 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:14:45.394000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00088ae80 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:14:45.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:14:45.965287 kubelet[1929]: I1002 19:14:45.965252 1929 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:14:45.966637 env[1047]: time="2023-10-02T19:14:45.966575021Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:14:45.967202 kubelet[1929]: I1002 19:14:45.966944 1929 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:14:46.784834 kubelet[1929]: I1002 19:14:46.784636 1929 topology_manager.go:215] "Topology Admit Handler" podUID="e6a12ee7-f4cf-4691-9871-968ae72f8ac1" podNamespace="kube-system" podName="kube-proxy-26qfg" Oct 2 19:14:46.802310 systemd[1]: Created slice kubepods-besteffort-pode6a12ee7_f4cf_4691_9871_968ae72f8ac1.slice. Oct 2 19:14:46.807035 kubelet[1929]: I1002 19:14:46.805606 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e6a12ee7-f4cf-4691-9871-968ae72f8ac1-kube-proxy\") pod \"kube-proxy-26qfg\" (UID: \"e6a12ee7-f4cf-4691-9871-968ae72f8ac1\") " pod="kube-system/kube-proxy-26qfg" Oct 2 19:14:46.807035 kubelet[1929]: I1002 19:14:46.805812 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e6a12ee7-f4cf-4691-9871-968ae72f8ac1-xtables-lock\") pod \"kube-proxy-26qfg\" (UID: \"e6a12ee7-f4cf-4691-9871-968ae72f8ac1\") " pod="kube-system/kube-proxy-26qfg" Oct 2 19:14:46.807035 kubelet[1929]: I1002 19:14:46.805921 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e6a12ee7-f4cf-4691-9871-968ae72f8ac1-lib-modules\") pod \"kube-proxy-26qfg\" (UID: \"e6a12ee7-f4cf-4691-9871-968ae72f8ac1\") " pod="kube-system/kube-proxy-26qfg" Oct 2 19:14:46.807035 kubelet[1929]: I1002 19:14:46.806027 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nr8mg\" (UniqueName: \"kubernetes.io/projected/e6a12ee7-f4cf-4691-9871-968ae72f8ac1-kube-api-access-nr8mg\") pod \"kube-proxy-26qfg\" (UID: \"e6a12ee7-f4cf-4691-9871-968ae72f8ac1\") " pod="kube-system/kube-proxy-26qfg" Oct 2 19:14:46.893979 kubelet[1929]: I1002 19:14:46.893940 1929 topology_manager.go:215] "Topology Admit Handler" podUID="9cdde356-a914-4c48-9942-9e4aec1b5999" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-z2z82" Oct 2 19:14:46.899731 systemd[1]: Created slice kubepods-besteffort-pod9cdde356_a914_4c48_9942_9e4aec1b5999.slice. Oct 2 19:14:46.906719 kubelet[1929]: I1002 19:14:46.906687 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9cdde356-a914-4c48-9942-9e4aec1b5999-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-z2z82\" (UID: \"9cdde356-a914-4c48-9942-9e4aec1b5999\") " pod="tigera-operator/tigera-operator-8547bd6cc6-z2z82" Oct 2 19:14:46.906883 kubelet[1929]: I1002 19:14:46.906774 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b59f4\" (UniqueName: \"kubernetes.io/projected/9cdde356-a914-4c48-9942-9e4aec1b5999-kube-api-access-b59f4\") pod \"tigera-operator-8547bd6cc6-z2z82\" (UID: \"9cdde356-a914-4c48-9942-9e4aec1b5999\") " pod="tigera-operator/tigera-operator-8547bd6cc6-z2z82" Oct 2 19:14:47.117330 env[1047]: time="2023-10-02T19:14:47.117037342Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-26qfg,Uid:e6a12ee7-f4cf-4691-9871-968ae72f8ac1,Namespace:kube-system,Attempt:0,}" Oct 2 19:14:47.169303 env[1047]: time="2023-10-02T19:14:47.169060813Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:47.169798 env[1047]: time="2023-10-02T19:14:47.169649758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:47.170109 env[1047]: time="2023-10-02T19:14:47.169996959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:47.171039 env[1047]: time="2023-10-02T19:14:47.170930160Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc139e7933656c6e1b413b9fabad3ca0f2e0a19a165bb4efd27bc63ab55622f8 pid=2013 runtime=io.containerd.runc.v2 Oct 2 19:14:47.205556 env[1047]: time="2023-10-02T19:14:47.205478326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-z2z82,Uid:9cdde356-a914-4c48-9942-9e4aec1b5999,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:14:47.211964 systemd[1]: Started cri-containerd-bc139e7933656c6e1b413b9fabad3ca0f2e0a19a165bb4efd27bc63ab55622f8.scope. Oct 2 19:14:47.249595 env[1047]: time="2023-10-02T19:14:47.249523114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:47.249885 env[1047]: time="2023-10-02T19:14:47.249861850Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:47.249976 env[1047]: time="2023-10-02T19:14:47.249955025Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.251000 audit: BPF prog-id=112 op=LOAD Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2013 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313339653739333336353663366531623431336239666162616433 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2013 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313339653739333336353663366531623431336239666162616433 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.253000 audit: BPF prog-id=113 op=LOAD Oct 2 19:14:47.253000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018d4d0 items=0 ppid=2013 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313339653739333336353663366531623431336239666162616433 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.254000 audit: BPF prog-id=114 op=LOAD Oct 2 19:14:47.254000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018d518 items=0 ppid=2013 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313339653739333336353663366531623431336239666162616433 Oct 2 19:14:47.255000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:14:47.255000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { perfmon } for pid=2024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit[2024]: AVC avc: denied { bpf } for pid=2024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.255000 audit: BPF prog-id=115 op=LOAD Oct 2 19:14:47.255000 audit[2024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018d928 items=0 ppid=2013 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263313339653739333336353663366531623431336239666162616433 Oct 2 19:14:47.259116 env[1047]: time="2023-10-02T19:14:47.259023012Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27112babb14d330189919a22ad16fd3105599dcec73b5006e0044db3c8d9fad9 pid=2048 runtime=io.containerd.runc.v2 Oct 2 19:14:47.272883 env[1047]: time="2023-10-02T19:14:47.272826257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-26qfg,Uid:e6a12ee7-f4cf-4691-9871-968ae72f8ac1,Namespace:kube-system,Attempt:0,} returns sandbox id \"bc139e7933656c6e1b413b9fabad3ca0f2e0a19a165bb4efd27bc63ab55622f8\"" Oct 2 19:14:47.277537 env[1047]: time="2023-10-02T19:14:47.277498104Z" level=info msg="CreateContainer within sandbox \"bc139e7933656c6e1b413b9fabad3ca0f2e0a19a165bb4efd27bc63ab55622f8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:14:47.285473 systemd[1]: Started cri-containerd-27112babb14d330189919a22ad16fd3105599dcec73b5006e0044db3c8d9fad9.scope. Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.304000 audit: BPF prog-id=116 op=LOAD Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2048 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313132626162623134643333303138393931396132326164313666 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2048 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313132626162623134643333303138393931396132326164313666 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.305000 audit: BPF prog-id=117 op=LOAD Oct 2 19:14:47.305000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000298340 items=0 ppid=2048 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313132626162623134643333303138393931396132326164313666 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.306000 audit: BPF prog-id=118 op=LOAD Oct 2 19:14:47.306000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000298388 items=0 ppid=2048 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313132626162623134643333303138393931396132326164313666 Oct 2 19:14:47.306000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:14:47.307000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.307000 audit: BPF prog-id=119 op=LOAD Oct 2 19:14:47.307000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000298798 items=0 ppid=2048 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237313132626162623134643333303138393931396132326164313666 Oct 2 19:14:47.321457 env[1047]: time="2023-10-02T19:14:47.321405445Z" level=info msg="CreateContainer within sandbox \"bc139e7933656c6e1b413b9fabad3ca0f2e0a19a165bb4efd27bc63ab55622f8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a42104c47f30c1e25f810f1ba2e25b97b3fb5e1fd3b2d01de841359849af37e8\"" Oct 2 19:14:47.324477 env[1047]: time="2023-10-02T19:14:47.324444948Z" level=info msg="StartContainer for \"a42104c47f30c1e25f810f1ba2e25b97b3fb5e1fd3b2d01de841359849af37e8\"" Oct 2 19:14:47.349488 env[1047]: time="2023-10-02T19:14:47.349420900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-z2z82,Uid:9cdde356-a914-4c48-9942-9e4aec1b5999,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"27112babb14d330189919a22ad16fd3105599dcec73b5006e0044db3c8d9fad9\"" Oct 2 19:14:47.354120 env[1047]: time="2023-10-02T19:14:47.354085774Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:14:47.362118 systemd[1]: Started cri-containerd-a42104c47f30c1e25f810f1ba2e25b97b3fb5e1fd3b2d01de841359849af37e8.scope. Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2013 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323130346334376633306331653235663831306631626132653235 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.383000 audit: BPF prog-id=120 op=LOAD Oct 2 19:14:47.383000 audit[2088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e65d0 items=0 ppid=2013 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323130346334376633306331653235663831306631626132653235 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.384000 audit: BPF prog-id=121 op=LOAD Oct 2 19:14:47.384000 audit[2088]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e6618 items=0 ppid=2013 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323130346334376633306331653235663831306631626132653235 Oct 2 19:14:47.385000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:14:47.385000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:47.385000 audit: BPF prog-id=122 op=LOAD Oct 2 19:14:47.385000 audit[2088]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e66a8 items=0 ppid=2013 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:47.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134323130346334376633306331653235663831306631626132653235 Oct 2 19:14:47.415366 env[1047]: time="2023-10-02T19:14:47.415284776Z" level=info msg="StartContainer for \"a42104c47f30c1e25f810f1ba2e25b97b3fb5e1fd3b2d01de841359849af37e8\" returns successfully" Oct 2 19:14:47.446956 kubelet[1929]: I1002 19:14:47.446925 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-26qfg" podStartSLOduration=1.446852739 podCreationTimestamp="2023-10-02 19:14:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:14:47.446007753 +0000 UTC m=+16.300203281" watchObservedRunningTime="2023-10-02 19:14:47.446852739 +0000 UTC m=+16.301048277" Oct 2 19:14:48.070000 audit[2146]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.074110 kernel: kauditd_printk_skb: 162 callbacks suppressed Oct 2 19:14:48.074295 kernel: audit: type=1325 audit(1696274088.070:998): table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.070000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd31c21f0 a2=0 a3=7fffd31c21dc items=0 ppid=2106 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.104712 kernel: audit: type=1300 audit(1696274088.070:998): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd31c21f0 a2=0 a3=7fffd31c21dc items=0 ppid=2106 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:14:48.113713 kernel: audit: type=1327 audit(1696274088.070:998): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:14:48.113882 kernel: audit: type=1325 audit(1696274088.073:999): table=nat:39 family=2 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.073000 audit[2147]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.073000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d63aa90 a2=0 a3=7ffd0d63aa7c items=0 ppid=2106 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:14:48.129675 kernel: audit: type=1300 audit(1696274088.073:999): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d63aa90 a2=0 a3=7ffd0d63aa7c items=0 ppid=2106 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.129820 kernel: audit: type=1327 audit(1696274088.073:999): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:14:48.129851 kernel: audit: type=1325 audit(1696274088.073:1000): table=filter:40 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.073000 audit[2148]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.073000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8efb83f0 a2=0 a3=7fff8efb83dc items=0 ppid=2106 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.138320 kernel: audit: type=1300 audit(1696274088.073:1000): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8efb83f0 a2=0 a3=7fff8efb83dc items=0 ppid=2106 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.138392 kernel: audit: type=1327 audit(1696274088.073:1000): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:14:48.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:14:48.094000 audit[2149]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.143480 kernel: audit: type=1325 audit(1696274088.094:1001): table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.094000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff297afeb0 a2=0 a3=7fff297afe9c items=0 ppid=2106 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:14:48.094000 audit[2150]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.094000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8c366450 a2=0 a3=7fff8c36643c items=0 ppid=2106 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:14:48.094000 audit[2151]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.094000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd14726c70 a2=0 a3=7ffd14726c5c items=0 ppid=2106 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:14:48.211000 audit[2152]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.211000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe5a26ca0 a2=0 a3=7fffe5a26c8c items=0 ppid=2106 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:14:48.220000 audit[2154]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.220000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd461af360 a2=0 a3=7ffd461af34c items=0 ppid=2106 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:14:48.228000 audit[2157]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.228000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd43f94550 a2=0 a3=7ffd43f9453c items=0 ppid=2106 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:14:48.230000 audit[2158]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.230000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc72e8e60 a2=0 a3=7ffcc72e8e4c items=0 ppid=2106 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:14:48.233000 audit[2160]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.233000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefb032110 a2=0 a3=7ffefb0320fc items=0 ppid=2106 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:14:48.234000 audit[2161]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.234000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff148ef390 a2=0 a3=7fff148ef37c items=0 ppid=2106 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:14:48.243000 audit[2163]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.243000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcab09db20 a2=0 a3=7ffcab09db0c items=0 ppid=2106 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:14:48.251000 audit[2166]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.251000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4465b720 a2=0 a3=7ffc4465b70c items=0 ppid=2106 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:14:48.252000 audit[2167]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.252000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe94157b00 a2=0 a3=7ffe94157aec items=0 ppid=2106 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:14:48.255000 audit[2169]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.255000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc299a0d0 a2=0 a3=7ffdc299a0bc items=0 ppid=2106 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:14:48.256000 audit[2170]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.256000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd1d0cf00 a2=0 a3=7ffdd1d0ceec items=0 ppid=2106 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:14:48.259000 audit[2172]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.259000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee73edbb0 a2=0 a3=7ffee73edb9c items=0 ppid=2106 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:48.263000 audit[2175]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.263000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3e9f9ff0 a2=0 a3=7ffe3e9f9fdc items=0 ppid=2106 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:48.268000 audit[2178]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.268000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe62cd5eb0 a2=0 a3=7ffe62cd5e9c items=0 ppid=2106 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:14:48.269000 audit[2179]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.269000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd268bd410 a2=0 a3=7ffd268bd3fc items=0 ppid=2106 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:14:48.274000 audit[2181]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.274000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe3d863100 a2=0 a3=7ffe3d8630ec items=0 ppid=2106 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:48.279000 audit[2184]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.279000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1e597010 a2=0 a3=7ffd1e596ffc items=0 ppid=2106 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:48.280000 audit[2185]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.280000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff35578640 a2=0 a3=7fff3557862c items=0 ppid=2106 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:14:48.282000 audit[2187]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:14:48.282000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff2dd68f10 a2=0 a3=7fff2dd68efc items=0 ppid=2106 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:14:48.323000 audit[2193]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:48.323000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffd507e830 a2=0 a3=7fffd507e81c items=0 ppid=2106 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:48.336000 audit[2193]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:48.336000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffd507e830 a2=0 a3=7fffd507e81c items=0 ppid=2106 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:48.339000 audit[2198]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.339000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb618cb60 a2=0 a3=7ffcb618cb4c items=0 ppid=2106 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:14:48.344000 audit[2200]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.344000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd41eb40c0 a2=0 a3=7ffd41eb40ac items=0 ppid=2106 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:14:48.350000 audit[2203]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.350000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7d487e80 a2=0 a3=7ffd7d487e6c items=0 ppid=2106 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:14:48.351000 audit[2204]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.351000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc792b360 a2=0 a3=7ffcc792b34c items=0 ppid=2106 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:14:48.355000 audit[2207]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.355000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6469eb90 a2=0 a3=7fff6469eb7c items=0 ppid=2106 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:14:48.357000 audit[2208]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.357000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe28eef060 a2=0 a3=7ffe28eef04c items=0 ppid=2106 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:14:48.361000 audit[2210]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.361000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce30a5c60 a2=0 a3=7ffce30a5c4c items=0 ppid=2106 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:14:48.367000 audit[2213]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.367000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe058b8d10 a2=0 a3=7ffe058b8cfc items=0 ppid=2106 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:14:48.369000 audit[2214]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.369000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff534f1460 a2=0 a3=7fff534f144c items=0 ppid=2106 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:14:48.373000 audit[2216]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.373000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc139a62c0 a2=0 a3=7ffc139a62ac items=0 ppid=2106 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:14:48.375000 audit[2217]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.375000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff642af540 a2=0 a3=7fff642af52c items=0 ppid=2106 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:14:48.380000 audit[2219]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.380000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd226a03b0 a2=0 a3=7ffd226a039c items=0 ppid=2106 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:14:48.386000 audit[2222]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.386000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb45383e0 a2=0 a3=7fffb45383cc items=0 ppid=2106 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:14:48.390000 audit[2225]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.390000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe312dabe0 a2=0 a3=7ffe312dabcc items=0 ppid=2106 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:14:48.395000 audit[2226]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.395000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3eaab750 a2=0 a3=7ffc3eaab73c items=0 ppid=2106 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:14:48.398000 audit[2228]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.398000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5a8d7a00 a2=0 a3=7ffc5a8d79ec items=0 ppid=2106 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:48.401000 audit[2231]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.401000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4919fa20 a2=0 a3=7fff4919fa0c items=0 ppid=2106 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:14:48.402000 audit[2232]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.402000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8584c3d0 a2=0 a3=7ffd8584c3bc items=0 ppid=2106 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:14:48.404000 audit[2234]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.404000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc5ac461a0 a2=0 a3=7ffc5ac4618c items=0 ppid=2106 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:14:48.406000 audit[2235]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.406000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe421b4cb0 a2=0 a3=7ffe421b4c9c items=0 ppid=2106 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:14:48.408000 audit[2237]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.408000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce24a9db0 a2=0 a3=7ffce24a9d9c items=0 ppid=2106 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:14:48.411000 audit[2240]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:14:48.411000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc19fcef0 a2=0 a3=7fffc19fcedc items=0 ppid=2106 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:14:48.414000 audit[2242]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:14:48.414000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd11296390 a2=0 a3=7ffd1129637c items=0 ppid=2106 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.414000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:48.416000 audit[2242]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:14:48.416000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd11296390 a2=0 a3=7ffd1129637c items=0 ppid=2106 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:48.416000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:49.090160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3361688738.mount: Deactivated successfully. Oct 2 19:14:50.731728 env[1047]: time="2023-10-02T19:14:50.731669553Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:50.735908 env[1047]: time="2023-10-02T19:14:50.735882799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:50.739681 env[1047]: time="2023-10-02T19:14:50.739634349Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:50.742812 env[1047]: time="2023-10-02T19:14:50.742787586Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:50.743812 env[1047]: time="2023-10-02T19:14:50.743784236Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:14:50.746547 env[1047]: time="2023-10-02T19:14:50.746518777Z" level=info msg="CreateContainer within sandbox \"27112babb14d330189919a22ad16fd3105599dcec73b5006e0044db3c8d9fad9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:14:50.769372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2398461709.mount: Deactivated successfully. Oct 2 19:14:50.785576 env[1047]: time="2023-10-02T19:14:50.785533407Z" level=info msg="CreateContainer within sandbox \"27112babb14d330189919a22ad16fd3105599dcec73b5006e0044db3c8d9fad9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3dc647fbcdbc99d646a14990a292ce1bae946daeb92d51b75305331111ce7209\"" Oct 2 19:14:50.787233 env[1047]: time="2023-10-02T19:14:50.786721737Z" level=info msg="StartContainer for \"3dc647fbcdbc99d646a14990a292ce1bae946daeb92d51b75305331111ce7209\"" Oct 2 19:14:50.825807 systemd[1]: Started cri-containerd-3dc647fbcdbc99d646a14990a292ce1bae946daeb92d51b75305331111ce7209.scope. Oct 2 19:14:50.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.848000 audit: BPF prog-id=123 op=LOAD Oct 2 19:14:50.849000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.849000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2048 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:50.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633634376662636462633939643634366131343939306132393263 Oct 2 19:14:50.849000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.849000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2048 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:50.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633634376662636462633939643634366131343939306132393263 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit: BPF prog-id=124 op=LOAD Oct 2 19:14:50.850000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00039c0c0 items=0 ppid=2048 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:50.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633634376662636462633939643634366131343939306132393263 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.850000 audit: BPF prog-id=125 op=LOAD Oct 2 19:14:50.850000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00039c108 items=0 ppid=2048 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:50.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633634376662636462633939643634366131343939306132393263 Oct 2 19:14:50.852000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:14:50.852000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:50.852000 audit: BPF prog-id=126 op=LOAD Oct 2 19:14:50.852000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00039c518 items=0 ppid=2048 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:50.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364633634376662636462633939643634366131343939306132393263 Oct 2 19:14:51.196474 env[1047]: time="2023-10-02T19:14:51.196104770Z" level=info msg="StartContainer for \"3dc647fbcdbc99d646a14990a292ce1bae946daeb92d51b75305331111ce7209\" returns successfully" Oct 2 19:14:51.467521 kubelet[1929]: I1002 19:14:51.467301 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-z2z82" podStartSLOduration=2.07336384 podCreationTimestamp="2023-10-02 19:14:46 +0000 UTC" firstStartedPulling="2023-10-02 19:14:47.351198617 +0000 UTC m=+16.205394145" lastFinishedPulling="2023-10-02 19:14:50.745007812 +0000 UTC m=+19.599203340" observedRunningTime="2023-10-02 19:14:51.46540629 +0000 UTC m=+20.319601868" watchObservedRunningTime="2023-10-02 19:14:51.467173035 +0000 UTC m=+20.321368634" Oct 2 19:14:51.766086 systemd[1]: run-containerd-runc-k8s.io-3dc647fbcdbc99d646a14990a292ce1bae946daeb92d51b75305331111ce7209-runc.hVxN4V.mount: Deactivated successfully. Oct 2 19:14:53.282700 kernel: kauditd_printk_skb: 200 callbacks suppressed Oct 2 19:14:53.282873 kernel: audit: type=1325 audit(1696274093.278:1067): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.278000 audit[2283]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.278000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe132fd550 a2=0 a3=7ffe132fd53c items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.289097 kernel: audit: type=1300 audit(1696274093.278:1067): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe132fd550 a2=0 a3=7ffe132fd53c items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.292111 kernel: audit: type=1327 audit(1696274093.278:1067): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.284000 audit[2283]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.295886 kernel: audit: type=1325 audit(1696274093.284:1068): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.284000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe132fd550 a2=0 a3=0 items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.302327 kernel: audit: type=1300 audit(1696274093.284:1068): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe132fd550 a2=0 a3=0 items=0 ppid=2106 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.305429 kernel: audit: type=1327 audit(1696274093.284:1068): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.305486 kernel: audit: type=1325 audit(1696274093.302:1069): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.302000 audit[2285]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.302000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd7c72a8a0 a2=0 a3=7ffd7c72a88c items=0 ppid=2106 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.316524 kernel: audit: type=1300 audit(1696274093.302:1069): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd7c72a8a0 a2=0 a3=7ffd7c72a88c items=0 ppid=2106 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.303000 audit[2285]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.324031 kernel: audit: type=1327 audit(1696274093.302:1069): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.324166 kernel: audit: type=1325 audit(1696274093.303:1070): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:53.303000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd7c72a8a0 a2=0 a3=0 items=0 ppid=2106 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:53.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:53.555052 kubelet[1929]: I1002 19:14:53.554891 1929 topology_manager.go:215] "Topology Admit Handler" podUID="c659f5fa-e8c1-46ce-8f04-ade89dc8e43c" podNamespace="calico-system" podName="calico-typha-58c8969f7f-5j9v4" Oct 2 19:14:53.561593 systemd[1]: Created slice kubepods-besteffort-podc659f5fa_e8c1_46ce_8f04_ade89dc8e43c.slice. Oct 2 19:14:53.570170 kubelet[1929]: W1002 19:14:53.570127 1929 reflector.go:535] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.570345 kubelet[1929]: E1002 19:14:53.570209 1929 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.642714 kubelet[1929]: I1002 19:14:53.642649 1929 topology_manager.go:215] "Topology Admit Handler" podUID="a85a4336-7058-4e87-b513-16a13f617492" podNamespace="calico-system" podName="calico-node-gdz5b" Oct 2 19:14:53.648767 systemd[1]: Created slice kubepods-besteffort-poda85a4336_7058_4e87_b513_16a13f617492.slice. Oct 2 19:14:53.653013 kubelet[1929]: W1002 19:14:53.652982 1929 reflector.go:535] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.653248 kubelet[1929]: E1002 19:14:53.653231 1929 reflector.go:147] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.653378 kubelet[1929]: W1002 19:14:53.653314 1929 reflector.go:535] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.653513 kubelet[1929]: E1002 19:14:53.653498 1929 reflector.go:147] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:14:53.655439 kubelet[1929]: I1002 19:14:53.655397 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c659f5fa-e8c1-46ce-8f04-ade89dc8e43c-typha-certs\") pod \"calico-typha-58c8969f7f-5j9v4\" (UID: \"c659f5fa-e8c1-46ce-8f04-ade89dc8e43c\") " pod="calico-system/calico-typha-58c8969f7f-5j9v4" Oct 2 19:14:53.655799 kubelet[1929]: I1002 19:14:53.655720 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a85a4336-7058-4e87-b513-16a13f617492-node-certs\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.655799 kubelet[1929]: I1002 19:14:53.655785 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b9fnx\" (UniqueName: \"kubernetes.io/projected/a85a4336-7058-4e87-b513-16a13f617492-kube-api-access-b9fnx\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.655935 kubelet[1929]: I1002 19:14:53.655818 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdxbb\" (UniqueName: \"kubernetes.io/projected/c659f5fa-e8c1-46ce-8f04-ade89dc8e43c-kube-api-access-sdxbb\") pod \"calico-typha-58c8969f7f-5j9v4\" (UID: \"c659f5fa-e8c1-46ce-8f04-ade89dc8e43c\") " pod="calico-system/calico-typha-58c8969f7f-5j9v4" Oct 2 19:14:53.655935 kubelet[1929]: I1002 19:14:53.655848 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-lib-modules\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.655935 kubelet[1929]: I1002 19:14:53.655877 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-var-lib-calico\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.655935 kubelet[1929]: I1002 19:14:53.655910 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-xtables-lock\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.655935 kubelet[1929]: I1002 19:14:53.655938 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-policysync\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656216 kubelet[1929]: I1002 19:14:53.655969 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-flexvol-driver-host\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656216 kubelet[1929]: I1002 19:14:53.656006 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c659f5fa-e8c1-46ce-8f04-ade89dc8e43c-tigera-ca-bundle\") pod \"calico-typha-58c8969f7f-5j9v4\" (UID: \"c659f5fa-e8c1-46ce-8f04-ade89dc8e43c\") " pod="calico-system/calico-typha-58c8969f7f-5j9v4" Oct 2 19:14:53.656216 kubelet[1929]: I1002 19:14:53.656038 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-cni-log-dir\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656216 kubelet[1929]: I1002 19:14:53.656070 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-cni-net-dir\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656216 kubelet[1929]: I1002 19:14:53.656098 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a85a4336-7058-4e87-b513-16a13f617492-tigera-ca-bundle\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656459 kubelet[1929]: I1002 19:14:53.656135 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-var-run-calico\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.656459 kubelet[1929]: I1002 19:14:53.656164 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a85a4336-7058-4e87-b513-16a13f617492-cni-bin-dir\") pod \"calico-node-gdz5b\" (UID: \"a85a4336-7058-4e87-b513-16a13f617492\") " pod="calico-system/calico-node-gdz5b" Oct 2 19:14:53.759364 kubelet[1929]: E1002 19:14:53.759334 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.759582 kubelet[1929]: W1002 19:14:53.759564 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.759706 kubelet[1929]: E1002 19:14:53.759692 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.760059 kubelet[1929]: E1002 19:14:53.760031 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.760164 kubelet[1929]: W1002 19:14:53.760152 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.760300 kubelet[1929]: E1002 19:14:53.760288 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.760808 kubelet[1929]: E1002 19:14:53.760795 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.760924 kubelet[1929]: W1002 19:14:53.760909 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.761101 kubelet[1929]: E1002 19:14:53.761053 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.761338 kubelet[1929]: E1002 19:14:53.761324 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.761475 kubelet[1929]: W1002 19:14:53.761456 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.761625 kubelet[1929]: E1002 19:14:53.761602 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.761976 kubelet[1929]: E1002 19:14:53.761965 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.762078 kubelet[1929]: W1002 19:14:53.762066 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.762218 kubelet[1929]: E1002 19:14:53.762196 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.762452 kubelet[1929]: E1002 19:14:53.762441 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.762553 kubelet[1929]: W1002 19:14:53.762540 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.762705 kubelet[1929]: E1002 19:14:53.762682 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.762922 kubelet[1929]: E1002 19:14:53.762911 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.763017 kubelet[1929]: W1002 19:14:53.763005 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.763153 kubelet[1929]: E1002 19:14:53.763128 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.763366 kubelet[1929]: E1002 19:14:53.763355 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.763467 kubelet[1929]: W1002 19:14:53.763455 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.763600 kubelet[1929]: E1002 19:14:53.763578 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.763853 kubelet[1929]: E1002 19:14:53.763842 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.763957 kubelet[1929]: W1002 19:14:53.763945 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.764092 kubelet[1929]: E1002 19:14:53.764069 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.764326 kubelet[1929]: E1002 19:14:53.764315 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.764428 kubelet[1929]: W1002 19:14:53.764415 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.764561 kubelet[1929]: E1002 19:14:53.764538 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.764845 kubelet[1929]: E1002 19:14:53.764833 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.764937 kubelet[1929]: W1002 19:14:53.764925 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.765071 kubelet[1929]: E1002 19:14:53.765049 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.765347 kubelet[1929]: E1002 19:14:53.765335 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.765437 kubelet[1929]: W1002 19:14:53.765424 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.765562 kubelet[1929]: E1002 19:14:53.765539 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.767673 kubelet[1929]: E1002 19:14:53.767634 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.767875 kubelet[1929]: W1002 19:14:53.767860 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.768004 kubelet[1929]: E1002 19:14:53.767990 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.768411 kubelet[1929]: E1002 19:14:53.768381 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.768411 kubelet[1929]: W1002 19:14:53.768403 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.768619 kubelet[1929]: E1002 19:14:53.768605 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.769904 kubelet[1929]: E1002 19:14:53.769870 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.769904 kubelet[1929]: W1002 19:14:53.769896 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.770127 kubelet[1929]: E1002 19:14:53.770105 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.770242 kubelet[1929]: E1002 19:14:53.770130 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.770343 kubelet[1929]: W1002 19:14:53.770327 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.770462 kubelet[1929]: E1002 19:14:53.770440 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.770797 kubelet[1929]: E1002 19:14:53.770786 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.770883 kubelet[1929]: W1002 19:14:53.770870 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.770963 kubelet[1929]: E1002 19:14:53.770952 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.771377 kubelet[1929]: E1002 19:14:53.771357 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.771377 kubelet[1929]: W1002 19:14:53.771373 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.771484 kubelet[1929]: E1002 19:14:53.771390 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.809715 kubelet[1929]: E1002 19:14:53.808801 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.809715 kubelet[1929]: W1002 19:14:53.808828 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.809715 kubelet[1929]: E1002 19:14:53.808896 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.813691 kubelet[1929]: E1002 19:14:53.812929 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.813691 kubelet[1929]: W1002 19:14:53.812960 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.813691 kubelet[1929]: E1002 19:14:53.813000 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.858493 kubelet[1929]: E1002 19:14:53.858457 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.858699 kubelet[1929]: W1002 19:14:53.858682 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.858790 kubelet[1929]: E1002 19:14:53.858779 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.859143 kubelet[1929]: E1002 19:14:53.859132 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.859237 kubelet[1929]: W1002 19:14:53.859225 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.859323 kubelet[1929]: E1002 19:14:53.859308 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.960934 kubelet[1929]: E1002 19:14:53.960907 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.961136 kubelet[1929]: W1002 19:14:53.961121 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.961219 kubelet[1929]: E1002 19:14:53.961208 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:53.961482 kubelet[1929]: E1002 19:14:53.961472 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:53.961547 kubelet[1929]: W1002 19:14:53.961537 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:53.961612 kubelet[1929]: E1002 19:14:53.961603 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.062271 kubelet[1929]: E1002 19:14:54.062187 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.062438 kubelet[1929]: W1002 19:14:54.062411 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.062521 kubelet[1929]: E1002 19:14:54.062509 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.062735 kubelet[1929]: E1002 19:14:54.062725 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.062825 kubelet[1929]: W1002 19:14:54.062814 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.062893 kubelet[1929]: E1002 19:14:54.062884 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.163972 kubelet[1929]: E1002 19:14:54.163943 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.163972 kubelet[1929]: W1002 19:14:54.163967 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.164171 kubelet[1929]: E1002 19:14:54.163995 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.164222 kubelet[1929]: E1002 19:14:54.164213 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.164255 kubelet[1929]: W1002 19:14:54.164223 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.164255 kubelet[1929]: E1002 19:14:54.164239 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.264864 kubelet[1929]: E1002 19:14:54.264837 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.265074 kubelet[1929]: W1002 19:14:54.265058 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.265184 kubelet[1929]: E1002 19:14:54.265172 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.265545 kubelet[1929]: E1002 19:14:54.265532 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.265648 kubelet[1929]: W1002 19:14:54.265631 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.265772 kubelet[1929]: E1002 19:14:54.265757 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.326000 audit[2321]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:54.326000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffee5e94f90 a2=0 a3=7ffee5e94f7c items=0 ppid=2106 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:54.327000 audit[2321]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:14:54.327000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffee5e94f90 a2=0 a3=0 items=0 ppid=2106 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:14:54.366565 kubelet[1929]: E1002 19:14:54.366533 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.366803 kubelet[1929]: W1002 19:14:54.366785 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.366928 kubelet[1929]: E1002 19:14:54.366913 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.367271 kubelet[1929]: E1002 19:14:54.367243 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.367363 kubelet[1929]: W1002 19:14:54.367351 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.367438 kubelet[1929]: E1002 19:14:54.367427 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.468777 kubelet[1929]: E1002 19:14:54.468741 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.468777 kubelet[1929]: W1002 19:14:54.468766 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.469012 kubelet[1929]: E1002 19:14:54.468807 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.469261 kubelet[1929]: E1002 19:14:54.469241 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.469261 kubelet[1929]: W1002 19:14:54.469254 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.469393 kubelet[1929]: E1002 19:14:54.469269 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.570071 kubelet[1929]: E1002 19:14:54.570045 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.570486 kubelet[1929]: W1002 19:14:54.570469 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.570563 kubelet[1929]: E1002 19:14:54.570553 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.570832 kubelet[1929]: E1002 19:14:54.570821 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.570918 kubelet[1929]: W1002 19:14:54.570906 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.570994 kubelet[1929]: E1002 19:14:54.570983 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.676462 kubelet[1929]: E1002 19:14:54.675582 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.676462 kubelet[1929]: W1002 19:14:54.675607 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.676462 kubelet[1929]: E1002 19:14:54.675630 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.676833 kubelet[1929]: E1002 19:14:54.676821 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.676942 kubelet[1929]: W1002 19:14:54.676930 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.677029 kubelet[1929]: E1002 19:14:54.677019 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.678352 kubelet[1929]: E1002 19:14:54.678342 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.678430 kubelet[1929]: W1002 19:14:54.678419 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.678498 kubelet[1929]: E1002 19:14:54.678489 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.759998 kubelet[1929]: E1002 19:14:54.759970 1929 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 19:14:54.760282 kubelet[1929]: E1002 19:14:54.760269 1929 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c659f5fa-e8c1-46ce-8f04-ade89dc8e43c-typha-certs podName:c659f5fa-e8c1-46ce-8f04-ade89dc8e43c nodeName:}" failed. No retries permitted until 2023-10-02 19:14:55.260241461 +0000 UTC m=+24.114436989 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/c659f5fa-e8c1-46ce-8f04-ade89dc8e43c-typha-certs") pod "calico-typha-58c8969f7f-5j9v4" (UID: "c659f5fa-e8c1-46ce-8f04-ade89dc8e43c") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:14:54.778641 kubelet[1929]: E1002 19:14:54.778617 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.778895 kubelet[1929]: W1002 19:14:54.778851 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.779017 kubelet[1929]: E1002 19:14:54.779004 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.855238 env[1047]: time="2023-10-02T19:14:54.855077558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gdz5b,Uid:a85a4336-7058-4e87-b513-16a13f617492,Namespace:calico-system,Attempt:0,}" Oct 2 19:14:54.885549 kubelet[1929]: E1002 19:14:54.885511 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.885886 kubelet[1929]: W1002 19:14:54.885854 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.886098 kubelet[1929]: E1002 19:14:54.886073 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.899321 env[1047]: time="2023-10-02T19:14:54.898849846Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:54.899321 env[1047]: time="2023-10-02T19:14:54.898945906Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:54.899321 env[1047]: time="2023-10-02T19:14:54.898978948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:54.900209 env[1047]: time="2023-10-02T19:14:54.900046230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f pid=2341 runtime=io.containerd.runc.v2 Oct 2 19:14:54.951554 systemd[1]: run-containerd-runc-k8s.io-9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f-runc.ruJyOI.mount: Deactivated successfully. Oct 2 19:14:54.962711 systemd[1]: Started cri-containerd-9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f.scope. Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.977000 audit: BPF prog-id=127 op=LOAD Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333433633166306361616533353933386432623639336530613537 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333433633166306361616533353933386432623639336530613537 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.978000 audit: BPF prog-id=128 op=LOAD Oct 2 19:14:54.978000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032b840 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333433633166306361616533353933386432623639336530613537 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit: BPF prog-id=129 op=LOAD Oct 2 19:14:54.979000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032b888 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333433633166306361616533353933386432623639336530613537 Oct 2 19:14:54.979000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:14:54.979000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:54.979000 audit: BPF prog-id=130 op=LOAD Oct 2 19:14:54.979000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032bc98 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:54.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333433633166306361616533353933386432623639336530613537 Oct 2 19:14:54.987435 kubelet[1929]: E1002 19:14:54.987330 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:54.987435 kubelet[1929]: W1002 19:14:54.987353 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:54.987435 kubelet[1929]: E1002 19:14:54.987375 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:54.995234 env[1047]: time="2023-10-02T19:14:54.995181859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gdz5b,Uid:a85a4336-7058-4e87-b513-16a13f617492,Namespace:calico-system,Attempt:0,} returns sandbox id \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\"" Oct 2 19:14:54.999836 env[1047]: time="2023-10-02T19:14:54.999788942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:14:55.088764 kubelet[1929]: E1002 19:14:55.088720 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.088764 kubelet[1929]: W1002 19:14:55.088743 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.088764 kubelet[1929]: E1002 19:14:55.088790 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.189965 kubelet[1929]: E1002 19:14:55.189903 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.189965 kubelet[1929]: W1002 19:14:55.189947 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.190294 kubelet[1929]: E1002 19:14:55.189997 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.292131 kubelet[1929]: E1002 19:14:55.291932 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.296546 kubelet[1929]: W1002 19:14:55.296426 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.296964 kubelet[1929]: E1002 19:14:55.296939 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.297965 kubelet[1929]: E1002 19:14:55.297905 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.298163 kubelet[1929]: W1002 19:14:55.298134 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.298377 kubelet[1929]: E1002 19:14:55.298354 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.299109 kubelet[1929]: E1002 19:14:55.299062 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.299292 kubelet[1929]: W1002 19:14:55.299266 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.299498 kubelet[1929]: E1002 19:14:55.299476 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.300065 kubelet[1929]: E1002 19:14:55.300041 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.300290 kubelet[1929]: W1002 19:14:55.300262 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.300456 kubelet[1929]: E1002 19:14:55.300434 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.301074 kubelet[1929]: E1002 19:14:55.301050 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.301247 kubelet[1929]: W1002 19:14:55.301222 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.301477 kubelet[1929]: E1002 19:14:55.301455 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.322104 kubelet[1929]: E1002 19:14:55.322066 1929 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:14:55.322452 kubelet[1929]: W1002 19:14:55.322422 1929 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:14:55.322972 kubelet[1929]: E1002 19:14:55.322914 1929 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:14:55.367539 env[1047]: time="2023-10-02T19:14:55.367417919Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58c8969f7f-5j9v4,Uid:c659f5fa-e8c1-46ce-8f04-ade89dc8e43c,Namespace:calico-system,Attempt:0,}" Oct 2 19:14:55.401995 env[1047]: time="2023-10-02T19:14:55.401540870Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:14:55.401995 env[1047]: time="2023-10-02T19:14:55.401639916Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:14:55.401995 env[1047]: time="2023-10-02T19:14:55.401719024Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:14:55.402909 env[1047]: time="2023-10-02T19:14:55.402738508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39d99f9c26a8d8edd4a97dc3a7ab51fd96ed566f9f1e53900cd60e2fbb837c68 pid=2391 runtime=io.containerd.runc.v2 Oct 2 19:14:55.433243 systemd[1]: Started cri-containerd-39d99f9c26a8d8edd4a97dc3a7ab51fd96ed566f9f1e53900cd60e2fbb837c68.scope. Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.473000 audit: BPF prog-id=131 op=LOAD Oct 2 19:14:55.476000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.476000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2391 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:55.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643939663963323661386438656464346139376463336137616235 Oct 2 19:14:55.476000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.476000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2391 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:55.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643939663963323661386438656464346139376463336137616235 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit: BPF prog-id=132 op=LOAD Oct 2 19:14:55.477000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003d2980 items=0 ppid=2391 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:55.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643939663963323661386438656464346139376463336137616235 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.477000 audit: BPF prog-id=133 op=LOAD Oct 2 19:14:55.477000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003d29c8 items=0 ppid=2391 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:55.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643939663963323661386438656464346139376463336137616235 Oct 2 19:14:55.478000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:14:55.478000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:55.478000 audit: BPF prog-id=134 op=LOAD Oct 2 19:14:55.478000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003d2dd8 items=0 ppid=2391 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:55.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339643939663963323661386438656464346139376463336137616235 Oct 2 19:14:55.546282 env[1047]: time="2023-10-02T19:14:55.544238931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58c8969f7f-5j9v4,Uid:c659f5fa-e8c1-46ce-8f04-ade89dc8e43c,Namespace:calico-system,Attempt:0,} returns sandbox id \"39d99f9c26a8d8edd4a97dc3a7ab51fd96ed566f9f1e53900cd60e2fbb837c68\"" Oct 2 19:14:59.790527 env[1047]: time="2023-10-02T19:14:59.790478618Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:59.793484 env[1047]: time="2023-10-02T19:14:59.793457846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:59.798990 env[1047]: time="2023-10-02T19:14:59.798920344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:59.802418 env[1047]: time="2023-10-02T19:14:59.802384063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:14:59.805066 env[1047]: time="2023-10-02T19:14:59.804993358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:14:59.808781 env[1047]: time="2023-10-02T19:14:59.808737252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:14:59.811880 env[1047]: time="2023-10-02T19:14:59.811836025Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:14:59.833415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount728745121.mount: Deactivated successfully. Oct 2 19:14:59.838863 env[1047]: time="2023-10-02T19:14:59.838815830Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee\"" Oct 2 19:14:59.839916 env[1047]: time="2023-10-02T19:14:59.839890056Z" level=info msg="StartContainer for \"a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee\"" Oct 2 19:14:59.888355 systemd[1]: Started cri-containerd-a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee.scope. Oct 2 19:14:59.914026 kernel: kauditd_printk_skb: 122 callbacks suppressed Oct 2 19:14:59.915281 kernel: audit: type=1400 audit(1696274099.908:1109): avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2341 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:59.922132 kernel: audit: type=1300 audit(1696274099.908:1109): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2341 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:59.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643433353331366631323739623262363161383566376630356161 Oct 2 19:14:59.931981 kernel: audit: type=1327 audit(1696274099.908:1109): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643433353331366631323739623262363161383566376630356161 Oct 2 19:14:59.932067 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.936427 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.940377 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.945693 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.950803 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.956679 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.960709 kernel: audit: type=1400 audit(1696274099.908:1110): avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.908000 audit: BPF prog-id=135 op=LOAD Oct 2 19:14:59.908000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0000247e0 items=0 ppid=2341 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:59.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643433353331366631323739623262363161383566376630356161 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.913000 audit: BPF prog-id=136 op=LOAD Oct 2 19:14:59.913000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024828 items=0 ppid=2341 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:59.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643433353331366631323739623262363161383566376630356161 Oct 2 19:14:59.914000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:14:59.914000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:14:59.914000 audit: BPF prog-id=137 op=LOAD Oct 2 19:14:59.914000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0000248b8 items=0 ppid=2341 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:59.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138643433353331366631323739623262363161383566376630356161 Oct 2 19:14:59.977519 systemd[1]: cri-containerd-a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee.scope: Deactivated successfully. Oct 2 19:14:59.980000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:14:59.999714 env[1047]: time="2023-10-02T19:14:59.999589950Z" level=info msg="StartContainer for \"a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee\" returns successfully" Oct 2 19:15:00.178729 env[1047]: time="2023-10-02T19:15:00.178582481Z" level=info msg="shim disconnected" id=a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee Oct 2 19:15:00.179091 env[1047]: time="2023-10-02T19:15:00.178731701Z" level=warning msg="cleaning up after shim disconnected" id=a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee namespace=k8s.io Oct 2 19:15:00.179091 env[1047]: time="2023-10-02T19:15:00.178764593Z" level=info msg="cleaning up dead shim" Oct 2 19:15:00.197157 env[1047]: time="2023-10-02T19:15:00.197057300Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:15:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2470 runtime=io.containerd.runc.v2\n" Oct 2 19:15:00.825314 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a8d435316f1279b2b61a85f7f05aaba26729b48aedd542147ac98cc432f32bee-rootfs.mount: Deactivated successfully. Oct 2 19:15:01.806994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3271064301.mount: Deactivated successfully. Oct 2 19:15:05.051445 env[1047]: time="2023-10-02T19:15:05.051354950Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:05.054306 env[1047]: time="2023-10-02T19:15:05.054253848Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:05.057876 env[1047]: time="2023-10-02T19:15:05.057837359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:05.061249 env[1047]: time="2023-10-02T19:15:05.061202081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:05.062833 env[1047]: time="2023-10-02T19:15:05.062772207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:15:05.065908 env[1047]: time="2023-10-02T19:15:05.065873364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:15:05.072369 env[1047]: time="2023-10-02T19:15:05.072323052Z" level=info msg="CreateContainer within sandbox \"39d99f9c26a8d8edd4a97dc3a7ab51fd96ed566f9f1e53900cd60e2fbb837c68\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:15:05.143057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4112602892.mount: Deactivated successfully. Oct 2 19:15:05.157354 env[1047]: time="2023-10-02T19:15:05.157207204Z" level=info msg="CreateContainer within sandbox \"39d99f9c26a8d8edd4a97dc3a7ab51fd96ed566f9f1e53900cd60e2fbb837c68\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"cd323b1ae0543f0238eea81c4a4f748488b877b2b9ca8360120529c8354f5a9c\"" Oct 2 19:15:05.161791 env[1047]: time="2023-10-02T19:15:05.158813217Z" level=info msg="StartContainer for \"cd323b1ae0543f0238eea81c4a4f748488b877b2b9ca8360120529c8354f5a9c\"" Oct 2 19:15:05.217304 systemd[1]: Started cri-containerd-cd323b1ae0543f0238eea81c4a4f748488b877b2b9ca8360120529c8354f5a9c.scope. Oct 2 19:15:05.231867 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:15:05.231992 kernel: audit: type=1400 audit(1696274105.229:1116): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238737 kernel: audit: type=1400 audit(1696274105.229:1117): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.243155 kernel: audit: type=1400 audit(1696274105.229:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.243218 kernel: audit: type=1400 audit(1696274105.229:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250715 kernel: audit: type=1400 audit(1696274105.229:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.255888 kernel: audit: type=1400 audit(1696274105.229:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.260405 kernel: audit: type=1400 audit(1696274105.229:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.260546 kernel: audit: type=1400 audit(1696274105.229:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.264301 kernel: audit: type=1400 audit(1696274105.229:1124): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.271635 kernel: audit: type=1400 audit(1696274105.231:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.231000 audit: BPF prog-id=138 op=LOAD Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2391 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333233623161653035343366303233386565613831633461346637 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2391 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333233623161653035343366303233386565613831633461346637 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.238000 audit: BPF prog-id=139 op=LOAD Oct 2 19:15:05.238000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000348360 items=0 ppid=2391 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333233623161653035343366303233386565613831633461346637 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.246000 audit: BPF prog-id=140 op=LOAD Oct 2 19:15:05.246000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003483a8 items=0 ppid=2391 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333233623161653035343366303233386565613831633461346637 Oct 2 19:15:05.250000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:15:05.250000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { perfmon } for pid=2495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit[2495]: AVC avc: denied { bpf } for pid=2495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:05.250000 audit: BPF prog-id=141 op=LOAD Oct 2 19:15:05.250000 audit[2495]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003487b8 items=0 ppid=2391 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364333233623161653035343366303233386565613831633461346637 Oct 2 19:15:05.327044 env[1047]: time="2023-10-02T19:15:05.326866633Z" level=info msg="StartContainer for \"cd323b1ae0543f0238eea81c4a4f748488b877b2b9ca8360120529c8354f5a9c\" returns successfully" Oct 2 19:15:05.647360 kubelet[1929]: I1002 19:15:05.647182 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-58c8969f7f-5j9v4" podStartSLOduration=3.131729788 podCreationTimestamp="2023-10-02 19:14:53 +0000 UTC" firstStartedPulling="2023-10-02 19:14:55.548061713 +0000 UTC m=+24.402257241" lastFinishedPulling="2023-10-02 19:15:05.063249201 +0000 UTC m=+33.917444759" observedRunningTime="2023-10-02 19:15:05.517692097 +0000 UTC m=+34.371887655" watchObservedRunningTime="2023-10-02 19:15:05.646917306 +0000 UTC m=+34.501112894" Oct 2 19:15:05.712000 audit[2527]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:05.712000 audit[2527]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe4a4738c0 a2=0 a3=7ffe4a4738ac items=0 ppid=2106 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:05.715000 audit[2527]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:05.715000 audit[2527]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe4a4738c0 a2=0 a3=7ffe4a4738ac items=0 ppid=2106 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:05.715000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:14.401352 env[1047]: time="2023-10-02T19:15:14.401177519Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:14.406714 env[1047]: time="2023-10-02T19:15:14.406580356Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:14.415830 env[1047]: time="2023-10-02T19:15:14.415619997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:14.420084 env[1047]: time="2023-10-02T19:15:14.419993742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:14.423484 env[1047]: time="2023-10-02T19:15:14.423399029Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:15:14.433918 env[1047]: time="2023-10-02T19:15:14.433067798Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:15:14.473741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount724834516.mount: Deactivated successfully. Oct 2 19:15:14.493346 env[1047]: time="2023-10-02T19:15:14.493221561Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956\"" Oct 2 19:15:14.499103 env[1047]: time="2023-10-02T19:15:14.495788626Z" level=info msg="StartContainer for \"b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956\"" Oct 2 19:15:14.557412 systemd[1]: Started cri-containerd-b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956.scope. Oct 2 19:15:14.581129 kernel: kauditd_printk_skb: 53 callbacks suppressed Oct 2 19:15:14.582158 kernel: audit: type=1400 audit(1696274114.576:1136): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2341 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:14.587755 kernel: audit: type=1300 audit(1696274114.576:1136): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2341 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:14.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232666465623336386634663831636635616663363462666465383664 Oct 2 19:15:14.592986 kernel: audit: type=1327 audit(1696274114.576:1136): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232666465623336386634663831636635616663363462666465383664 Oct 2 19:15:14.593046 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.599715 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.605878 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.606790 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.617693 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.617826 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.626150 kernel: audit: type=1400 audit(1696274114.576:1137): avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.576000 audit: BPF prog-id=142 op=LOAD Oct 2 19:15:14.576000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00028a3c0 items=0 ppid=2341 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:14.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232666465623336386634663831636635616663363462666465383664 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.580000 audit: BPF prog-id=143 op=LOAD Oct 2 19:15:14.580000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00028a408 items=0 ppid=2341 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:14.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232666465623336386634663831636635616663363462666465383664 Oct 2 19:15:14.581000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:15:14.581000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:14.581000 audit: BPF prog-id=144 op=LOAD Oct 2 19:15:14.581000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00028a498 items=0 ppid=2341 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:14.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232666465623336386634663831636635616663363462666465383664 Oct 2 19:15:14.638109 env[1047]: time="2023-10-02T19:15:14.635281232Z" level=info msg="StartContainer for \"b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956\" returns successfully" Oct 2 19:15:15.462385 systemd[1]: run-containerd-runc-k8s.io-b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956-runc.hottL1.mount: Deactivated successfully. Oct 2 19:15:16.807064 env[1047]: time="2023-10-02T19:15:16.806724481Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:15:16.814070 systemd[1]: cri-containerd-b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956.scope: Deactivated successfully. Oct 2 19:15:16.816000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:15:16.848899 kubelet[1929]: I1002 19:15:16.847199 1929 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:15:16.873519 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956-rootfs.mount: Deactivated successfully. Oct 2 19:15:16.914115 kubelet[1929]: I1002 19:15:16.914062 1929 topology_manager.go:215] "Topology Admit Handler" podUID="29552fe2-6b0e-4198-ae90-d05a92dcfa56" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-b75rs" Oct 2 19:15:16.940568 kubelet[1929]: I1002 19:15:16.918006 1929 topology_manager.go:215] "Topology Admit Handler" podUID="cd011473-25a3-4de6-82a6-2db677228ff1" podNamespace="kube-system" podName="coredns-5dd5756b68-sln2w" Oct 2 19:15:16.940568 kubelet[1929]: I1002 19:15:16.922758 1929 topology_manager.go:215] "Topology Admit Handler" podUID="06d3a54f-8f15-484d-914c-7551aaf1bd77" podNamespace="kube-system" podName="coredns-5dd5756b68-njhdh" Oct 2 19:15:16.940568 kubelet[1929]: W1002 19:15:16.933696 1929 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:15:16.940568 kubelet[1929]: E1002 19:15:16.933731 1929 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-0-b-c273fa9e33.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-0-b-c273fa9e33.novalocal' and this object Oct 2 19:15:16.921010 systemd[1]: Created slice kubepods-besteffort-pod29552fe2_6b0e_4198_ae90_d05a92dcfa56.slice. Oct 2 19:15:16.928297 systemd[1]: Created slice kubepods-burstable-podcd011473_25a3_4de6_82a6_2db677228ff1.slice. Oct 2 19:15:16.934008 systemd[1]: Created slice kubepods-burstable-pod06d3a54f_8f15_484d_914c_7551aaf1bd77.slice. Oct 2 19:15:17.081117 kubelet[1929]: I1002 19:15:17.080976 1929 topology_manager.go:215] "Topology Admit Handler" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" podNamespace="calico-system" podName="csi-node-driver-fsrbh" Oct 2 19:15:17.084194 kubelet[1929]: I1002 19:15:17.084177 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z76lf\" (UniqueName: \"kubernetes.io/projected/29552fe2-6b0e-4198-ae90-d05a92dcfa56-kube-api-access-z76lf\") pod \"calico-kube-controllers-74b9887bb6-b75rs\" (UID: \"29552fe2-6b0e-4198-ae90-d05a92dcfa56\") " pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" Oct 2 19:15:17.084386 kubelet[1929]: I1002 19:15:17.084373 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/06d3a54f-8f15-484d-914c-7551aaf1bd77-config-volume\") pod \"coredns-5dd5756b68-njhdh\" (UID: \"06d3a54f-8f15-484d-914c-7551aaf1bd77\") " pod="kube-system/coredns-5dd5756b68-njhdh" Oct 2 19:15:17.084503 kubelet[1929]: I1002 19:15:17.084492 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/b6e2378a-26af-4c59-819c-a41a1c7f7ece-etccalico\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.084616 kubelet[1929]: I1002 19:15:17.084606 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cd011473-25a3-4de6-82a6-2db677228ff1-config-volume\") pod \"coredns-5dd5756b68-sln2w\" (UID: \"cd011473-25a3-4de6-82a6-2db677228ff1\") " pod="kube-system/coredns-5dd5756b68-sln2w" Oct 2 19:15:17.084747 kubelet[1929]: I1002 19:15:17.084737 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b6e2378a-26af-4c59-819c-a41a1c7f7ece-varrun\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.084861 kubelet[1929]: I1002 19:15:17.084851 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wd5tt\" (UniqueName: \"kubernetes.io/projected/b6e2378a-26af-4c59-819c-a41a1c7f7ece-kube-api-access-wd5tt\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.084979 kubelet[1929]: I1002 19:15:17.084968 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q28jq\" (UniqueName: \"kubernetes.io/projected/cd011473-25a3-4de6-82a6-2db677228ff1-kube-api-access-q28jq\") pod \"coredns-5dd5756b68-sln2w\" (UID: \"cd011473-25a3-4de6-82a6-2db677228ff1\") " pod="kube-system/coredns-5dd5756b68-sln2w" Oct 2 19:15:17.085087 kubelet[1929]: I1002 19:15:17.085077 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lrwwl\" (UniqueName: \"kubernetes.io/projected/06d3a54f-8f15-484d-914c-7551aaf1bd77-kube-api-access-lrwwl\") pod \"coredns-5dd5756b68-njhdh\" (UID: \"06d3a54f-8f15-484d-914c-7551aaf1bd77\") " pod="kube-system/coredns-5dd5756b68-njhdh" Oct 2 19:15:17.085193 kubelet[1929]: I1002 19:15:17.085182 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b6e2378a-26af-4c59-819c-a41a1c7f7ece-registration-dir\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.085386 kubelet[1929]: I1002 19:15:17.085289 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b6e2378a-26af-4c59-819c-a41a1c7f7ece-socket-dir\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.085635 kubelet[1929]: I1002 19:15:17.085610 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b6e2378a-26af-4c59-819c-a41a1c7f7ece-kubelet-dir\") pod \"csi-node-driver-fsrbh\" (UID: \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\") " pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.092171 systemd[1]: Created slice kubepods-besteffort-podb6e2378a_26af_4c59_819c_a41a1c7f7ece.slice. Oct 2 19:15:17.396984 env[1047]: time="2023-10-02T19:15:17.396560558Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fsrbh,Uid:b6e2378a-26af-4c59-819c-a41a1c7f7ece,Namespace:calico-system,Attempt:0,}" Oct 2 19:15:17.403048 env[1047]: time="2023-10-02T19:15:17.402826659Z" level=info msg="shim disconnected" id=b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956 Oct 2 19:15:17.403048 env[1047]: time="2023-10-02T19:15:17.402860953Z" level=warning msg="cleaning up after shim disconnected" id=b2fdeb368f4f81cf5afc64bfde86d0ff9ec6e4a4cae09d0b5be2015f4096c956 namespace=k8s.io Oct 2 19:15:17.403048 env[1047]: time="2023-10-02T19:15:17.402870923Z" level=info msg="cleaning up dead shim" Oct 2 19:15:17.432476 env[1047]: time="2023-10-02T19:15:17.432437068Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:15:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2588 runtime=io.containerd.runc.v2\n" Oct 2 19:15:17.541891 env[1047]: time="2023-10-02T19:15:17.541848476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-b75rs,Uid:29552fe2-6b0e-4198-ae90-d05a92dcfa56,Namespace:calico-system,Attempt:0,}" Oct 2 19:15:17.547869 env[1047]: time="2023-10-02T19:15:17.547739809Z" level=error msg="Failed to destroy network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.548836 env[1047]: time="2023-10-02T19:15:17.548753000Z" level=error msg="encountered an error cleaning up failed sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.548968 env[1047]: time="2023-10-02T19:15:17.548894457Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fsrbh,Uid:b6e2378a-26af-4c59-819c-a41a1c7f7ece,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.549800 kubelet[1929]: E1002 19:15:17.549763 1929 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.549915 kubelet[1929]: E1002 19:15:17.549888 1929 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.549982 kubelet[1929]: E1002 19:15:17.549966 1929 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fsrbh" Oct 2 19:15:17.550154 kubelet[1929]: E1002 19:15:17.550116 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:15:17.565808 env[1047]: time="2023-10-02T19:15:17.563021697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:15:17.570022 kubelet[1929]: I1002 19:15:17.569361 1929 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:17.570442 env[1047]: time="2023-10-02T19:15:17.570409032Z" level=info msg="StopPodSandbox for \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\"" Oct 2 19:15:17.642076 env[1047]: time="2023-10-02T19:15:17.641974256Z" level=error msg="StopPodSandbox for \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\" failed" error="failed to destroy network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.642343 kubelet[1929]: E1002 19:15:17.642314 1929 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:17.642417 kubelet[1929]: E1002 19:15:17.642396 1929 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0"} Oct 2 19:15:17.642455 kubelet[1929]: E1002 19:15:17.642441 1929 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:15:17.642541 kubelet[1929]: E1002 19:15:17.642480 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6e2378a-26af-4c59-819c-a41a1c7f7ece\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:15:17.679318 env[1047]: time="2023-10-02T19:15:17.677495525Z" level=error msg="Failed to destroy network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.679318 env[1047]: time="2023-10-02T19:15:17.677942348Z" level=error msg="encountered an error cleaning up failed sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.679318 env[1047]: time="2023-10-02T19:15:17.678004656Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-b75rs,Uid:29552fe2-6b0e-4198-ae90-d05a92dcfa56,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.679583 kubelet[1929]: E1002 19:15:17.678791 1929 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:17.679583 kubelet[1929]: E1002 19:15:17.678865 1929 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" Oct 2 19:15:17.679583 kubelet[1929]: E1002 19:15:17.678892 1929 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" Oct 2 19:15:17.679732 kubelet[1929]: E1002 19:15:17.678962 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-b75rs_calico-system(29552fe2-6b0e-4198-ae90-d05a92dcfa56)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-b75rs_calico-system(29552fe2-6b0e-4198-ae90-d05a92dcfa56)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" podUID="29552fe2-6b0e-4198-ae90-d05a92dcfa56" Oct 2 19:15:18.143368 env[1047]: time="2023-10-02T19:15:18.143288672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-njhdh,Uid:06d3a54f-8f15-484d-914c-7551aaf1bd77,Namespace:kube-system,Attempt:0,}" Oct 2 19:15:18.144207 env[1047]: time="2023-10-02T19:15:18.144130350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sln2w,Uid:cd011473-25a3-4de6-82a6-2db677228ff1,Namespace:kube-system,Attempt:0,}" Oct 2 19:15:18.304034 env[1047]: time="2023-10-02T19:15:18.303959401Z" level=error msg="Failed to destroy network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.305908 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe-shm.mount: Deactivated successfully. Oct 2 19:15:18.307235 env[1047]: time="2023-10-02T19:15:18.307139279Z" level=error msg="encountered an error cleaning up failed sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.307304 env[1047]: time="2023-10-02T19:15:18.307252071Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-njhdh,Uid:06d3a54f-8f15-484d-914c-7551aaf1bd77,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.307579 kubelet[1929]: E1002 19:15:18.307554 1929 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.308346 kubelet[1929]: E1002 19:15:18.307624 1929 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-njhdh" Oct 2 19:15:18.308346 kubelet[1929]: E1002 19:15:18.307688 1929 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-njhdh" Oct 2 19:15:18.308346 kubelet[1929]: E1002 19:15:18.307758 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-njhdh_kube-system(06d3a54f-8f15-484d-914c-7551aaf1bd77)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-njhdh_kube-system(06d3a54f-8f15-484d-914c-7551aaf1bd77)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-njhdh" podUID="06d3a54f-8f15-484d-914c-7551aaf1bd77" Oct 2 19:15:18.328891 env[1047]: time="2023-10-02T19:15:18.328822777Z" level=error msg="Failed to destroy network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.330754 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b-shm.mount: Deactivated successfully. Oct 2 19:15:18.331997 env[1047]: time="2023-10-02T19:15:18.331938984Z" level=error msg="encountered an error cleaning up failed sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.332065 env[1047]: time="2023-10-02T19:15:18.332008946Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sln2w,Uid:cd011473-25a3-4de6-82a6-2db677228ff1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.332365 kubelet[1929]: E1002 19:15:18.332342 1929 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.332439 kubelet[1929]: E1002 19:15:18.332422 1929 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-sln2w" Oct 2 19:15:18.332478 kubelet[1929]: E1002 19:15:18.332452 1929 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-sln2w" Oct 2 19:15:18.332765 kubelet[1929]: E1002 19:15:18.332551 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-sln2w_kube-system(cd011473-25a3-4de6-82a6-2db677228ff1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-sln2w_kube-system(cd011473-25a3-4de6-82a6-2db677228ff1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-sln2w" podUID="cd011473-25a3-4de6-82a6-2db677228ff1" Oct 2 19:15:18.576717 kubelet[1929]: I1002 19:15:18.573405 1929 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:18.576887 env[1047]: time="2023-10-02T19:15:18.574267080Z" level=info msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" Oct 2 19:15:18.581280 kubelet[1929]: I1002 19:15:18.580456 1929 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:18.581564 env[1047]: time="2023-10-02T19:15:18.581535289Z" level=info msg="StopPodSandbox for \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\"" Oct 2 19:15:18.584716 kubelet[1929]: I1002 19:15:18.584246 1929 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:18.585350 env[1047]: time="2023-10-02T19:15:18.585291624Z" level=info msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" Oct 2 19:15:18.648097 env[1047]: time="2023-10-02T19:15:18.648022634Z" level=error msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" failed" error="failed to destroy network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.648402 kubelet[1929]: E1002 19:15:18.648378 1929 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:18.648463 kubelet[1929]: E1002 19:15:18.648449 1929 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073"} Oct 2 19:15:18.648510 kubelet[1929]: E1002 19:15:18.648494 1929 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29552fe2-6b0e-4198-ae90-d05a92dcfa56\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:15:18.648603 kubelet[1929]: E1002 19:15:18.648560 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29552fe2-6b0e-4198-ae90-d05a92dcfa56\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" podUID="29552fe2-6b0e-4198-ae90-d05a92dcfa56" Oct 2 19:15:18.658097 env[1047]: time="2023-10-02T19:15:18.658027364Z" level=error msg="StopPodSandbox for \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\" failed" error="failed to destroy network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.658374 kubelet[1929]: E1002 19:15:18.658331 1929 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:18.658430 kubelet[1929]: E1002 19:15:18.658402 1929 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe"} Oct 2 19:15:18.658477 kubelet[1929]: E1002 19:15:18.658464 1929 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"06d3a54f-8f15-484d-914c-7551aaf1bd77\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:15:18.658561 kubelet[1929]: E1002 19:15:18.658520 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"06d3a54f-8f15-484d-914c-7551aaf1bd77\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-njhdh" podUID="06d3a54f-8f15-484d-914c-7551aaf1bd77" Oct 2 19:15:18.659546 env[1047]: time="2023-10-02T19:15:18.659495483Z" level=error msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" failed" error="failed to destroy network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:15:18.659867 kubelet[1929]: E1002 19:15:18.659839 1929 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:18.659932 kubelet[1929]: E1002 19:15:18.659870 1929 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b"} Oct 2 19:15:18.659970 kubelet[1929]: E1002 19:15:18.659945 1929 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cd011473-25a3-4de6-82a6-2db677228ff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:15:18.660053 kubelet[1929]: E1002 19:15:18.659982 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cd011473-25a3-4de6-82a6-2db677228ff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-sln2w" podUID="cd011473-25a3-4de6-82a6-2db677228ff1" Oct 2 19:15:25.044501 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214755132.mount: Deactivated successfully. Oct 2 19:15:25.322753 env[1047]: time="2023-10-02T19:15:25.322312430Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:25.329523 env[1047]: time="2023-10-02T19:15:25.329433678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:25.341319 env[1047]: time="2023-10-02T19:15:25.341234666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:25.348403 env[1047]: time="2023-10-02T19:15:25.348299388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:15:25.355850 env[1047]: time="2023-10-02T19:15:25.355701246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:25.362798 env[1047]: time="2023-10-02T19:15:25.362703850Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:15:25.395566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount831218812.mount: Deactivated successfully. Oct 2 19:15:25.410704 env[1047]: time="2023-10-02T19:15:25.410545930Z" level=info msg="CreateContainer within sandbox \"9e343c1f0caae35938d2b693e0a57563031b39f7ac3023df7aa3708dc02c834f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5\"" Oct 2 19:15:25.415568 env[1047]: time="2023-10-02T19:15:25.412953998Z" level=info msg="StartContainer for \"20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5\"" Oct 2 19:15:25.455148 systemd[1]: Started cri-containerd-20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5.scope. Oct 2 19:15:25.490680 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:15:25.490932 kernel: audit: type=1400 audit(1696274125.478:1143): avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.490991 kernel: audit: type=1300 audit(1696274125.478:1143): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2341 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2341 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:25.496818 kernel: audit: type=1327 audit(1696274125.478:1143): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230616462363035316236393131643163623362353463323630636635 Oct 2 19:15:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230616462363035316236393131643163623362353463323630636635 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.500713 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.508840 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.508902 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.512777 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.512996 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.526949 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.527027 kernel: audit: type=1400 audit(1696274125.478:1144): avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.527278 env[1047]: time="2023-10-02T19:15:25.527240331Z" level=info msg="StartContainer for \"20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5\" returns successfully" Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit: BPF prog-id=145 op=LOAD Oct 2 19:15:25.478000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003296d0 items=0 ppid=2341 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230616462363035316236393131643163623362353463323630636635 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.478000 audit: BPF prog-id=146 op=LOAD Oct 2 19:15:25.478000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000329718 items=0 ppid=2341 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230616462363035316236393131643163623362353463323630636635 Oct 2 19:15:25.479000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:15:25.479000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.479000 audit: BPF prog-id=147 op=LOAD Oct 2 19:15:25.479000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003297a8 items=0 ppid=2341 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:25.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230616462363035316236393131643163623362353463323630636635 Oct 2 19:15:25.593000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:25.593000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fb07b0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:25.593000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:25.593000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:25.593000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016ba1a0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:25.593000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:25.641664 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:15:25.641849 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:15:25.652738 kubelet[1929]: I1002 19:15:25.652177 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gdz5b" podStartSLOduration=2.297893661 podCreationTimestamp="2023-10-02 19:14:53 +0000 UTC" firstStartedPulling="2023-10-02 19:14:54.997043211 +0000 UTC m=+23.851238739" lastFinishedPulling="2023-10-02 19:15:25.349217307 +0000 UTC m=+54.203412885" observedRunningTime="2023-10-02 19:15:25.643711119 +0000 UTC m=+54.497906658" watchObservedRunningTime="2023-10-02 19:15:25.650067807 +0000 UTC m=+54.504263335" Oct 2 19:15:27.137000 audit[2957]: AVC avc: denied { write } for pid=2957 comm="tee" name="fd" dev="proc" ino=26838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.140000 audit[2944]: AVC avc: denied { write } for pid=2944 comm="tee" name="fd" dev="proc" ino=25904 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.140000 audit[2944]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5aa3e94a a2=241 a3=1b6 items=1 ppid=2920 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.140000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:15:27.140000 audit: PATH item=0 name="/dev/fd/63" inode=26821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.137000 audit[2957]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3ea8e95b a2=241 a3=1b6 items=1 ppid=2925 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.137000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:15:27.137000 audit: PATH item=0 name="/dev/fd/63" inode=25899 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.161000 audit[2967]: AVC avc: denied { write } for pid=2967 comm="tee" name="fd" dev="proc" ino=25919 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.161000 audit[2967]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd80e99959 a2=241 a3=1b6 items=1 ppid=2935 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.161000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:15:27.161000 audit: PATH item=0 name="/dev/fd/63" inode=25908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.164000 audit[2971]: AVC avc: denied { write } for pid=2971 comm="tee" name="fd" dev="proc" ino=25923 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.164000 audit[2971]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda40f295a a2=241 a3=1b6 items=1 ppid=2927 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.164000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:15:27.164000 audit: PATH item=0 name="/dev/fd/63" inode=26847 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.166000 audit[2969]: AVC avc: denied { write } for pid=2969 comm="tee" name="fd" dev="proc" ino=25930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.166000 audit[2969]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb082e959 a2=241 a3=1b6 items=1 ppid=2928 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.166000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:15:27.166000 audit: PATH item=0 name="/dev/fd/63" inode=25911 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.170000 audit[2978]: AVC avc: denied { write } for pid=2978 comm="tee" name="fd" dev="proc" ino=25934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.170000 audit[2978]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0cebb959 a2=241 a3=1b6 items=1 ppid=2921 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.170000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:15:27.170000 audit: PATH item=0 name="/dev/fd/63" inode=25916 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.172000 audit[2988]: AVC avc: denied { write } for pid=2988 comm="tee" name="fd" dev="proc" ino=25938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:15:27.172000 audit[2988]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc786e0949 a2=241 a3=1b6 items=1 ppid=2941 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.172000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:15:27.172000 audit: PATH item=0 name="/dev/fd/63" inode=25927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:15:27.172000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:15:27.249000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.249000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00d891420 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.250000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=523396 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.250000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00e80ac30 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.262000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.262000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00e83a7b0 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.266000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=523402 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.266000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00e83a840 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.358000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.358000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00d891520 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.358000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.358000 audit[1810]: AVC avc: denied { watch } for pid=1810 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=523400 scontext=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:27.358000 audit[1810]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00e83a900 a2=fc6 a3=0 items=0 ppid=1663 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c237,c942 key=(null) Oct 2 19:15:27.358000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323239002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.650000 audit: BPF prog-id=148 op=LOAD Oct 2 19:15:27.650000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6ea08070 a2=70 a3=7fceb514f000 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.650000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.651000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.651000 audit: BPF prog-id=149 op=LOAD Oct 2 19:15:27.651000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6ea08070 a2=70 a3=6e items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.652000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:15:27.652000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.652000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6ea08020 a2=70 a3=470860 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.652000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit: BPF prog-id=150 op=LOAD Oct 2 19:15:27.653000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff6ea08000 a2=70 a3=7fff6ea08070 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.653000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.653000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:15:27.653000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.653000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea080e0 a2=70 a3=0 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.653000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.654000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.654000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6ea080d0 a2=70 a3=0 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.654000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.654000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.654000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff6ea08110 a2=70 a3=fe00 items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.654000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.656000 audit: BPF prog-id=151 op=LOAD Oct 2 19:15:27.656000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff6ea08030 a2=70 a3=ffffffff items=0 ppid=2929 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:15:27.659000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.659000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff170b7760 a2=70 a3=ffff items=0 ppid=2929 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.659000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:15:27.660000 audit[3064]: AVC avc: denied { bpf } for pid=3064 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:27.660000 audit[3064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff170b7630 a2=70 a3=3 items=0 ppid=2929 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.660000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:15:27.667000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:15:27.768000 audit[3087]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3087 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:27.768000 audit[3087]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc52764930 a2=0 a3=7ffc5276491c items=0 ppid=2929 pid=3087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:27.776000 audit[3088]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:27.776000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffee90dc1f0 a2=0 a3=7ffee90dc1dc items=0 ppid=2929 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.776000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:27.780000 audit[3086]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:27.780000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff320e7430 a2=0 a3=0 items=0 ppid=2929 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.780000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:27.784000 audit[3089]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3089 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:27.784000 audit[3089]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff76bfdd30 a2=0 a3=0 items=0 ppid=2929 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:27.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:28.516092 systemd-networkd[973]: vxlan.calico: Link UP Oct 2 19:15:28.516112 systemd-networkd[973]: vxlan.calico: Gained carrier Oct 2 19:15:29.312691 env[1047]: time="2023-10-02T19:15:29.312557424Z" level=info msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" Oct 2 19:15:29.598268 systemd-networkd[973]: vxlan.calico: Gained IPv6LL Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.458 [INFO][3125] k8s.go 576: Cleaning up netns ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.463 [INFO][3125] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" iface="eth0" netns="/var/run/netns/cni-eed786cb-e22d-3684-eea4-c68404fd1610" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.464 [INFO][3125] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" iface="eth0" netns="/var/run/netns/cni-eed786cb-e22d-3684-eea4-c68404fd1610" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.466 [INFO][3125] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" iface="eth0" netns="/var/run/netns/cni-eed786cb-e22d-3684-eea4-c68404fd1610" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.466 [INFO][3125] k8s.go 583: Releasing IP address(es) ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.466 [INFO][3125] utils.go 196: Calico CNI releasing IP address ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.810 [INFO][3131] ipam_plugin.go 416: Releasing address using handleID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:29.856651 env[1047]: time="2023-10-02T19:15:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:29.856651 env[1047]: time="2023-10-02T19:15:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.845 [WARNING][3131] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.845 [INFO][3131] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:29.856651 env[1047]: time="2023-10-02T19:15:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:29.856651 env[1047]: 2023-10-02 19:15:29.852 [INFO][3125] k8s.go 589: Teardown processing complete. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:29.858320 env[1047]: time="2023-10-02T19:15:29.858253558Z" level=info msg="TearDown network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" successfully" Oct 2 19:15:29.858507 env[1047]: time="2023-10-02T19:15:29.858462711Z" level=info msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" returns successfully" Oct 2 19:15:29.860745 env[1047]: time="2023-10-02T19:15:29.860461816Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sln2w,Uid:cd011473-25a3-4de6-82a6-2db677228ff1,Namespace:kube-system,Attempt:1,}" Oct 2 19:15:29.864545 systemd[1]: run-netns-cni\x2deed786cb\x2de22d\x2d3684\x2deea4\x2dc68404fd1610.mount: Deactivated successfully. Oct 2 19:15:30.100229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:15:30.100416 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic635f6485e0: link becomes ready Oct 2 19:15:30.109204 systemd-networkd[973]: calic635f6485e0: Link UP Oct 2 19:15:30.109211 systemd-networkd[973]: calic635f6485e0: Gained carrier Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:29.964 [INFO][3148] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0 coredns-5dd5756b68- kube-system cd011473-25a3-4de6-82a6-2db677228ff1 680 0 2023-10-02 19:14:46 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-b-c273fa9e33.novalocal coredns-5dd5756b68-sln2w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic635f6485e0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:29.966 [INFO][3148] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.017 [INFO][3159] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" HandleID="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.033 [INFO][3159] ipam_plugin.go 269: Auto assigning IP ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" HandleID="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000429f20), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-b-c273fa9e33.novalocal", "pod":"coredns-5dd5756b68-sln2w", "timestamp":"2023-10-02 19:15:30.017014524 +0000 UTC"}, Hostname:"ci-3510-3-0-b-c273fa9e33.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:15:30.131919 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:30.131919 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.033 [INFO][3159] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-b-c273fa9e33.novalocal' Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.042 [INFO][3159] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.059 [INFO][3159] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.064 [INFO][3159] ipam.go 489: Trying affinity for 192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.067 [INFO][3159] ipam.go 155: Attempting to load block cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.070 [INFO][3159] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.070 [INFO][3159] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.0/26 handle="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.073 [INFO][3159] ipam.go 1682: Creating new handle: k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45 Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.078 [INFO][3159] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.0/26 handle="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.086 [INFO][3159] ipam.go 1216: Successfully claimed IPs: [192.168.23.1/26] block=192.168.23.0/26 handle="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.086 [INFO][3159] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.1/26] handle="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.131919 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:30.131919 env[1047]: 2023-10-02 19:15:30.086 [INFO][3159] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.23.1/26] IPv6=[] ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" HandleID="k8s-pod-network.ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.091 [INFO][3148] k8s.go 383: Populated endpoint ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd011473-25a3-4de6-82a6-2db677228ff1", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"", Pod:"coredns-5dd5756b68-sln2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic635f6485e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.092 [INFO][3148] k8s.go 384: Calico CNI using IPs: [192.168.23.1/32] ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.092 [INFO][3148] dataplane_linux.go 68: Setting the host side veth name to calic635f6485e0 ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.100 [INFO][3148] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.111 [INFO][3148] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd011473-25a3-4de6-82a6-2db677228ff1", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45", Pod:"coredns-5dd5756b68-sln2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic635f6485e0", MAC:"0a:32:29:49:8d:91", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:30.132631 env[1047]: 2023-10-02 19:15:30.129 [INFO][3148] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45" Namespace="kube-system" Pod="coredns-5dd5756b68-sln2w" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:30.150256 env[1047]: time="2023-10-02T19:15:30.150149029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:30.150256 env[1047]: time="2023-10-02T19:15:30.150216095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:30.150494 env[1047]: time="2023-10-02T19:15:30.150230913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:30.150785 env[1047]: time="2023-10-02T19:15:30.150732488Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45 pid=3184 runtime=io.containerd.runc.v2 Oct 2 19:15:30.166000 audit[3199]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:30.166000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff7345c460 a2=0 a3=7fff7345c44c items=0 ppid=2929 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.166000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:30.181579 systemd[1]: Started cri-containerd-ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45.scope. Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.199000 audit: BPF prog-id=152 op=LOAD Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3184 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162356366346431613637613465313335346439613530303735653735 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3184 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162356366346431613637613465313335346439613530303735653735 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit: BPF prog-id=153 op=LOAD Oct 2 19:15:30.200000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d8e40 items=0 ppid=3184 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162356366346431613637613465313335346439613530303735653735 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit: BPF prog-id=154 op=LOAD Oct 2 19:15:30.200000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d8e88 items=0 ppid=3184 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162356366346431613637613465313335346439613530303735653735 Oct 2 19:15:30.200000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:15:30.200000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { perfmon } for pid=3198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.200000 audit: BPF prog-id=155 op=LOAD Oct 2 19:15:30.200000 audit[3198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d9298 items=0 ppid=3184 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162356366346431613637613465313335346439613530303735653735 Oct 2 19:15:30.239245 env[1047]: time="2023-10-02T19:15:30.239189274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sln2w,Uid:cd011473-25a3-4de6-82a6-2db677228ff1,Namespace:kube-system,Attempt:1,} returns sandbox id \"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45\"" Oct 2 19:15:30.246113 env[1047]: time="2023-10-02T19:15:30.246062308Z" level=info msg="CreateContainer within sandbox \"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:15:30.270900 env[1047]: time="2023-10-02T19:15:30.270860749Z" level=info msg="CreateContainer within sandbox \"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dca2e499fd18ff44b13b5af65c14a90f093b85f764bafc91ae238c213683b740\"" Oct 2 19:15:30.271950 env[1047]: time="2023-10-02T19:15:30.271930715Z" level=info msg="StartContainer for \"dca2e499fd18ff44b13b5af65c14a90f093b85f764bafc91ae238c213683b740\"" Oct 2 19:15:30.288973 systemd[1]: Started cri-containerd-dca2e499fd18ff44b13b5af65c14a90f093b85f764bafc91ae238c213683b740.scope. Oct 2 19:15:30.310030 env[1047]: time="2023-10-02T19:15:30.309990641Z" level=info msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.310000 audit: BPF prog-id=156 op=LOAD Oct 2 19:15:30.312000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.312000 audit[3230]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3184 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613265343939666431386666343462313362356166363563313461 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3184 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613265343939666431386666343462313362356166363563313461 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit: BPF prog-id=157 op=LOAD Oct 2 19:15:30.313000 audit[3230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000339a30 items=0 ppid=3184 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613265343939666431386666343462313362356166363563313461 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit: BPF prog-id=158 op=LOAD Oct 2 19:15:30.313000 audit[3230]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000339a78 items=0 ppid=3184 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613265343939666431386666343462313362356166363563313461 Oct 2 19:15:30.313000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:15:30.313000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.313000 audit: BPF prog-id=159 op=LOAD Oct 2 19:15:30.313000 audit[3230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000339e88 items=0 ppid=3184 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613265343939666431386666343462313362356166363563313461 Oct 2 19:15:30.343035 env[1047]: time="2023-10-02T19:15:30.342968977Z" level=info msg="StartContainer for \"dca2e499fd18ff44b13b5af65c14a90f093b85f764bafc91ae238c213683b740\" returns successfully" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.387 [INFO][3262] k8s.go 576: Cleaning up netns ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.387 [INFO][3262] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" iface="eth0" netns="/var/run/netns/cni-1092c3c2-9e68-6949-4422-6bb29986ad75" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.388 [INFO][3262] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" iface="eth0" netns="/var/run/netns/cni-1092c3c2-9e68-6949-4422-6bb29986ad75" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.388 [INFO][3262] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" iface="eth0" netns="/var/run/netns/cni-1092c3c2-9e68-6949-4422-6bb29986ad75" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.388 [INFO][3262] k8s.go 583: Releasing IP address(es) ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.388 [INFO][3262] utils.go 196: Calico CNI releasing IP address ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.422 [INFO][3274] ipam_plugin.go 416: Releasing address using handleID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.435906 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:30.435906 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.430 [WARNING][3274] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.430 [INFO][3274] ipam_plugin.go 444: Releasing address using workloadID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.435906 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:30.435906 env[1047]: 2023-10-02 19:15:30.434 [INFO][3262] k8s.go 589: Teardown processing complete. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:30.436488 env[1047]: time="2023-10-02T19:15:30.436093265Z" level=info msg="TearDown network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" successfully" Oct 2 19:15:30.436488 env[1047]: time="2023-10-02T19:15:30.436124643Z" level=info msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" returns successfully" Oct 2 19:15:30.437143 env[1047]: time="2023-10-02T19:15:30.437090512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-b75rs,Uid:29552fe2-6b0e-4198-ae90-d05a92dcfa56,Namespace:calico-system,Attempt:1,}" Oct 2 19:15:30.630760 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3aeddf0d244: link becomes ready Oct 2 19:15:30.646483 systemd-networkd[973]: cali3aeddf0d244: Link UP Oct 2 19:15:30.646494 systemd-networkd[973]: cali3aeddf0d244: Gained carrier Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.517 [INFO][3284] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0 calico-kube-controllers-74b9887bb6- calico-system 29552fe2-6b0e-4198-ae90-d05a92dcfa56 689 0 2023-10-02 19:14:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-0-b-c273fa9e33.novalocal calico-kube-controllers-74b9887bb6-b75rs eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3aeddf0d244 [] []}} ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.518 [INFO][3284] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.559 [INFO][3296] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" HandleID="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.580 [INFO][3296] ipam_plugin.go 269: Auto assigning IP ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" HandleID="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-b-c273fa9e33.novalocal", "pod":"calico-kube-controllers-74b9887bb6-b75rs", "timestamp":"2023-10-02 19:15:30.559599848 +0000 UTC"}, Hostname:"ci-3510-3-0-b-c273fa9e33.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:15:30.667384 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:30.667384 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.580 [INFO][3296] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-b-c273fa9e33.novalocal' Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.582 [INFO][3296] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.589 [INFO][3296] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.594 [INFO][3296] ipam.go 489: Trying affinity for 192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.596 [INFO][3296] ipam.go 155: Attempting to load block cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.609 [INFO][3296] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.609 [INFO][3296] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.0/26 handle="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.613 [INFO][3296] ipam.go 1682: Creating new handle: k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03 Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.618 [INFO][3296] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.0/26 handle="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.625 [INFO][3296] ipam.go 1216: Successfully claimed IPs: [192.168.23.2/26] block=192.168.23.0/26 handle="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.625 [INFO][3296] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.2/26] handle="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:30.667384 env[1047]: time="2023-10-02T19:15:30Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:30.667384 env[1047]: 2023-10-02 19:15:30.625 [INFO][3296] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.23.2/26] IPv6=[] ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" HandleID="k8s-pod-network.a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.627 [INFO][3284] k8s.go 383: Populated endpoint ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"29552fe2-6b0e-4198-ae90-d05a92dcfa56", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-b75rs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.23.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3aeddf0d244", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.627 [INFO][3284] k8s.go 384: Calico CNI using IPs: [192.168.23.2/32] ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.628 [INFO][3284] dataplane_linux.go 68: Setting the host side veth name to cali3aeddf0d244 ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.630 [INFO][3284] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.646 [INFO][3284] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"29552fe2-6b0e-4198-ae90-d05a92dcfa56", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03", Pod:"calico-kube-controllers-74b9887bb6-b75rs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.23.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3aeddf0d244", MAC:"26:87:b1:29:08:75", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:30.668942 env[1047]: 2023-10-02 19:15:30.660 [INFO][3284] k8s.go 489: Wrote updated endpoint to datastore ContainerID="a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-b75rs" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:30.679745 kubelet[1929]: I1002 19:15:30.679679 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-sln2w" podStartSLOduration=44.679607773 podCreationTimestamp="2023-10-02 19:14:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:30.678799471 +0000 UTC m=+59.532995009" watchObservedRunningTime="2023-10-02 19:15:30.679607773 +0000 UTC m=+59.533803311" Oct 2 19:15:30.698582 env[1047]: time="2023-10-02T19:15:30.696864492Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:30.698582 env[1047]: time="2023-10-02T19:15:30.696906681Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:30.698582 env[1047]: time="2023-10-02T19:15:30.696919767Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:30.698582 env[1047]: time="2023-10-02T19:15:30.697040864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03 pid=3324 runtime=io.containerd.runc.v2 Oct 2 19:15:30.713633 systemd[1]: Started cri-containerd-a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03.scope. Oct 2 19:15:30.742285 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:15:30.742430 kernel: audit: type=1325 audit(1696274130.737:1219): table=filter:102 family=2 entries=40 op=nft_register_chain pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:30.737000 audit[3347]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3347 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:30.737000 audit[3347]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff6849da10 a2=0 a3=7fff6849d9fc items=0 ppid=2929 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.748682 kernel: audit: type=1300 audit(1696274130.737:1219): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff6849da10 a2=0 a3=7fff6849d9fc items=0 ppid=2929 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:30.752728 kernel: audit: type=1327 audit(1696274130.737:1219): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:30.765379 kernel: audit: type=1400 audit(1696274130.757:1220): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765502 kernel: audit: type=1400 audit(1696274130.757:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.772844 kernel: audit: type=1400 audit(1696274130.757:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.772898 kernel: audit: type=1400 audit(1696274130.757:1223): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.776576 kernel: audit: type=1400 audit(1696274130.757:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.783836 kernel: audit: type=1400 audit(1696274130.757:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.783894 kernel: audit: type=1400 audit(1696274130.757:1226): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.757000 audit: BPF prog-id=160 op=LOAD Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3324 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663033653733656630656339316563363739343135323864306331 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3324 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663033653733656630656339316563363739343135323864306331 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.765000 audit: BPF prog-id=161 op=LOAD Oct 2 19:15:30.765000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216540 items=0 ppid=3324 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663033653733656630656339316563363739343135323864306331 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit: BPF prog-id=162 op=LOAD Oct 2 19:15:30.768000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216588 items=0 ppid=3324 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663033653733656630656339316563363739343135323864306331 Oct 2 19:15:30.768000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:15:30.768000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { perfmon } for pid=3335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.779000 audit[3354]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:30.779000 audit[3354]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc31fdfe40 a2=0 a3=7ffc31fdfe2c items=0 ppid=2106 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:30.768000 audit[3335]: AVC avc: denied { bpf } for pid=3335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:30.768000 audit: BPF prog-id=163 op=LOAD Oct 2 19:15:30.768000 audit[3335]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216998 items=0 ppid=3324 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663033653733656630656339316563363739343135323864306331 Oct 2 19:15:30.790000 audit[3354]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:30.790000 audit[3354]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc31fdfe40 a2=0 a3=0 items=0 ppid=2106 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:30.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:30.831518 env[1047]: time="2023-10-02T19:15:30.823401443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-b75rs,Uid:29552fe2-6b0e-4198-ae90-d05a92dcfa56,Namespace:calico-system,Attempt:1,} returns sandbox id \"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03\"" Oct 2 19:15:30.831518 env[1047]: time="2023-10-02T19:15:30.826961647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:15:30.865733 systemd[1]: run-netns-cni\x2d1092c3c2\x2d9e68\x2d6949\x2d4422\x2d6bb29986ad75.mount: Deactivated successfully. Oct 2 19:15:31.316177 env[1047]: time="2023-10-02T19:15:31.315841410Z" level=info msg="StopPodSandbox for \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\"" Oct 2 19:15:31.318938 env[1047]: time="2023-10-02T19:15:31.317719106Z" level=info msg="StopPodSandbox for \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\"" Oct 2 19:15:31.356062 env[1047]: time="2023-10-02T19:15:31.355970155Z" level=info msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.421 [INFO][3390] k8s.go 576: Cleaning up netns ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.422 [INFO][3390] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" iface="eth0" netns="/var/run/netns/cni-e7f28629-0e4d-a334-1e31-d2ca4b96165c" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.422 [INFO][3390] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" iface="eth0" netns="/var/run/netns/cni-e7f28629-0e4d-a334-1e31-d2ca4b96165c" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.422 [INFO][3390] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" iface="eth0" netns="/var/run/netns/cni-e7f28629-0e4d-a334-1e31-d2ca4b96165c" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.422 [INFO][3390] k8s.go 583: Releasing IP address(es) ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.422 [INFO][3390] utils.go 196: Calico CNI releasing IP address ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.488 [INFO][3424] ipam_plugin.go 416: Releasing address using handleID ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" HandleID="k8s-pod-network.6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.510170 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:31.510170 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.501 [WARNING][3424] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" HandleID="k8s-pod-network.6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.501 [INFO][3424] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" HandleID="k8s-pod-network.6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.510170 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:31.510170 env[1047]: 2023-10-02 19:15:31.507 [INFO][3390] k8s.go 589: Teardown processing complete. ContainerID="6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe" Oct 2 19:15:31.512936 systemd[1]: run-netns-cni\x2de7f28629\x2d0e4d\x2da334\x2d1e31\x2dd2ca4b96165c.mount: Deactivated successfully. Oct 2 19:15:31.513738 env[1047]: time="2023-10-02T19:15:31.513642281Z" level=info msg="TearDown network for sandbox \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\" successfully" Oct 2 19:15:31.513858 env[1047]: time="2023-10-02T19:15:31.513837769Z" level=info msg="StopPodSandbox for \"6f2b3842d57e52fff36405c8e7af88b85aa02d5af9695c3e8a025f0774e738fe\" returns successfully" Oct 2 19:15:31.514844 env[1047]: time="2023-10-02T19:15:31.514818486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-njhdh,Uid:06d3a54f-8f15-484d-914c-7551aaf1bd77,Namespace:kube-system,Attempt:1,}" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.469 [INFO][3403] k8s.go 576: Cleaning up netns ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.472 [INFO][3403] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" iface="eth0" netns="/var/run/netns/cni-bc36cb06-d7d8-69f5-7b7b-e2b43cecf621" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.472 [INFO][3403] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" iface="eth0" netns="/var/run/netns/cni-bc36cb06-d7d8-69f5-7b7b-e2b43cecf621" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.472 [INFO][3403] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" iface="eth0" netns="/var/run/netns/cni-bc36cb06-d7d8-69f5-7b7b-e2b43cecf621" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.472 [INFO][3403] k8s.go 583: Releasing IP address(es) ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.472 [INFO][3403] utils.go 196: Calico CNI releasing IP address ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.554 [INFO][3430] ipam_plugin.go 416: Releasing address using handleID ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" HandleID="k8s-pod-network.8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:31.574293 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:31.574293 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.563 [WARNING][3430] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" HandleID="k8s-pod-network.8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.563 [INFO][3430] ipam_plugin.go 444: Releasing address using workloadID ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" HandleID="k8s-pod-network.8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:31.574293 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:31.574293 env[1047]: 2023-10-02 19:15:31.570 [INFO][3403] k8s.go 589: Teardown processing complete. ContainerID="8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0" Oct 2 19:15:31.576792 systemd[1]: run-netns-cni\x2dbc36cb06\x2dd7d8\x2d69f5\x2d7b7b\x2de2b43cecf621.mount: Deactivated successfully. Oct 2 19:15:31.577249 env[1047]: time="2023-10-02T19:15:31.577208159Z" level=info msg="TearDown network for sandbox \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\" successfully" Oct 2 19:15:31.577334 env[1047]: time="2023-10-02T19:15:31.577316142Z" level=info msg="StopPodSandbox for \"8af9b8b09be6832e8d7849186982959e681119731ffb719533a84317bec23ea0\" returns successfully" Oct 2 19:15:31.579290 env[1047]: time="2023-10-02T19:15:31.579259883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fsrbh,Uid:b6e2378a-26af-4c59-819c-a41a1c7f7ece,Namespace:calico-system,Attempt:1,}" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.506 [WARNING][3418] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd011473-25a3-4de6-82a6-2db677228ff1", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45", Pod:"coredns-5dd5756b68-sln2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic635f6485e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.507 [INFO][3418] k8s.go 576: Cleaning up netns ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.507 [INFO][3418] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" iface="eth0" netns="" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.507 [INFO][3418] k8s.go 583: Releasing IP address(es) ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.507 [INFO][3418] utils.go 196: Calico CNI releasing IP address ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.557 [INFO][3436] ipam_plugin.go 416: Releasing address using handleID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.593108 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:31.593108 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.580 [WARNING][3436] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.580 [INFO][3436] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.593108 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:31.593108 env[1047]: 2023-10-02 19:15:31.591 [INFO][3418] k8s.go 589: Teardown processing complete. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.593621 env[1047]: time="2023-10-02T19:15:31.593126024Z" level=info msg="TearDown network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" successfully" Oct 2 19:15:31.593621 env[1047]: time="2023-10-02T19:15:31.593156230Z" level=info msg="StopPodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" returns successfully" Oct 2 19:15:31.593987 env[1047]: time="2023-10-02T19:15:31.593952720Z" level=info msg="RemovePodSandbox for \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" Oct 2 19:15:31.594123 env[1047]: time="2023-10-02T19:15:31.594079519Z" level=info msg="Forcibly stopping sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\"" Oct 2 19:15:31.735000 audit[3501]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:31.735000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe9c0de5f0 a2=0 a3=7ffe9c0de5dc items=0 ppid=2106 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:31.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:31.739000 audit[3501]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:31.739000 audit[3501]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe9c0de5f0 a2=0 a3=7ffe9c0de5dc items=0 ppid=2106 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:31.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:31.899443 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:15:31.899573 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib622edd3e54: link becomes ready Oct 2 19:15:31.904855 systemd-networkd[973]: calib622edd3e54: Link UP Oct 2 19:15:31.904864 systemd-networkd[973]: calib622edd3e54: Gained carrier Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.640 [INFO][3443] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0 coredns-5dd5756b68- kube-system 06d3a54f-8f15-484d-914c-7551aaf1bd77 702 0 2023-10-02 19:14:46 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-0-b-c273fa9e33.novalocal coredns-5dd5756b68-njhdh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib622edd3e54 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.641 [INFO][3443] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.729 [INFO][3488] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" HandleID="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.760 [INFO][3488] ipam_plugin.go 269: Auto assigning IP ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" HandleID="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000215110), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-0-b-c273fa9e33.novalocal", "pod":"coredns-5dd5756b68-njhdh", "timestamp":"2023-10-02 19:15:31.729449468 +0000 UTC"}, Hostname:"ci-3510-3-0-b-c273fa9e33.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:15:31.981150 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:31.981150 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.760 [INFO][3488] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-b-c273fa9e33.novalocal' Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.763 [INFO][3488] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.777 [INFO][3488] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.794 [INFO][3488] ipam.go 489: Trying affinity for 192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.801 [INFO][3488] ipam.go 155: Attempting to load block cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.817 [INFO][3488] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.817 [INFO][3488] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.0/26 handle="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.832 [INFO][3488] ipam.go 1682: Creating new handle: k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71 Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.846 [INFO][3488] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.0/26 handle="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.893 [INFO][3488] ipam.go 1216: Successfully claimed IPs: [192.168.23.3/26] block=192.168.23.0/26 handle="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.893 [INFO][3488] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.3/26] handle="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:31.981150 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:31.981150 env[1047]: 2023-10-02 19:15:31.893 [INFO][3488] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.23.3/26] IPv6=[] ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" HandleID="k8s-pod-network.02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.895 [INFO][3443] k8s.go 383: Populated endpoint ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06d3a54f-8f15-484d-914c-7551aaf1bd77", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"", Pod:"coredns-5dd5756b68-njhdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib622edd3e54", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.895 [INFO][3443] k8s.go 384: Calico CNI using IPs: [192.168.23.3/32] ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.895 [INFO][3443] dataplane_linux.go 68: Setting the host side veth name to calib622edd3e54 ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.899 [INFO][3443] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.905 [INFO][3443] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06d3a54f-8f15-484d-914c-7551aaf1bd77", ResourceVersion:"702", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71", Pod:"coredns-5dd5756b68-njhdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib622edd3e54", MAC:"fe:c4:f9:b4:96:3d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:31.984967 env[1047]: 2023-10-02 19:15:31.969 [INFO][3443] k8s.go 489: Wrote updated endpoint to datastore ContainerID="02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71" Namespace="kube-system" Pod="coredns-5dd5756b68-njhdh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--njhdh-eth0" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.693 [WARNING][3472] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"cd011473-25a3-4de6-82a6-2db677228ff1", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"ab5cf4d1a67a4e1354d9a50075e7526a94de8ded54672a5fcb80fcef88b88d45", Pod:"coredns-5dd5756b68-sln2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.23.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic635f6485e0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.693 [INFO][3472] k8s.go 576: Cleaning up netns ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.693 [INFO][3472] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" iface="eth0" netns="" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.694 [INFO][3472] k8s.go 583: Releasing IP address(es) ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.694 [INFO][3472] utils.go 196: Calico CNI releasing IP address ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.780 [INFO][3493] ipam_plugin.go 416: Releasing address using handleID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.995690 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:31.995690 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.967 [WARNING][3493] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.968 [INFO][3493] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" HandleID="k8s-pod-network.1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-coredns--5dd5756b68--sln2w-eth0" Oct 2 19:15:31.995690 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:31.995690 env[1047]: 2023-10-02 19:15:31.993 [INFO][3472] k8s.go 589: Teardown processing complete. ContainerID="1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b" Oct 2 19:15:31.996389 env[1047]: time="2023-10-02T19:15:31.996340499Z" level=info msg="TearDown network for sandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" successfully" Oct 2 19:15:32.012688 env[1047]: time="2023-10-02T19:15:32.012628919Z" level=info msg="RemovePodSandbox \"1e129ca6df075da9e0f5306200360f4b70be84ac955a8b1d0b88bdf7b2843a4b\" returns successfully" Oct 2 19:15:32.013706 env[1047]: time="2023-10-02T19:15:32.013678354Z" level=info msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" Oct 2 19:15:32.019931 env[1047]: time="2023-10-02T19:15:32.019814849Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:32.019931 env[1047]: time="2023-10-02T19:15:32.019865434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:32.019931 env[1047]: time="2023-10-02T19:15:32.019886614Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:32.020282 env[1047]: time="2023-10-02T19:15:32.020015246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71 pid=3538 runtime=io.containerd.runc.v2 Oct 2 19:15:32.049976 systemd[1]: Started cri-containerd-02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71.scope. Oct 2 19:15:32.060740 systemd[1]: run-containerd-runc-k8s.io-02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71-runc.cxHWlA.mount: Deactivated successfully. Oct 2 19:15:32.087690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e30035c2d7: link becomes ready Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.094000 audit: BPF prog-id=164 op=LOAD Oct 2 19:15:32.098115 systemd-networkd[973]: calic635f6485e0: Gained IPv6LL Oct 2 19:15:32.100492 systemd-networkd[973]: cali6e30035c2d7: Link UP Oct 2 19:15:32.100498 systemd-networkd[973]: cali6e30035c2d7: Gained carrier Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.749 [INFO][3477] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0 csi-node-driver- calico-system b6e2378a-26af-4c59-819c-a41a1c7f7ece 703 0 2023-10-02 19:15:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-0-b-c273fa9e33.novalocal csi-node-driver-fsrbh eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6e30035c2d7 [] []}} ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.749 [INFO][3477] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.819 [INFO][3503] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" HandleID="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.838 [INFO][3503] ipam_plugin.go 269: Auto assigning IP ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" HandleID="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-0-b-c273fa9e33.novalocal", "pod":"csi-node-driver-fsrbh", "timestamp":"2023-10-02 19:15:31.819203319 +0000 UTC"}, Hostname:"ci-3510-3-0-b-c273fa9e33.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:15:32.138518 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:32.138518 env[1047]: time="2023-10-02T19:15:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.974 [INFO][3503] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-b-c273fa9e33.novalocal' Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.978 [INFO][3503] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:31.998 [INFO][3503] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.029 [INFO][3503] ipam.go 489: Trying affinity for 192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.033 [INFO][3503] ipam.go 155: Attempting to load block cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.039 [INFO][3503] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.039 [INFO][3503] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.0/26 handle="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.041 [INFO][3503] ipam.go 1682: Creating new handle: k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136 Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.057 [INFO][3503] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.0/26 handle="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.077 [INFO][3503] ipam.go 1216: Successfully claimed IPs: [192.168.23.4/26] block=192.168.23.0/26 handle="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.077 [INFO][3503] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.4/26] handle="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:15:32.138518 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:32.138518 env[1047]: 2023-10-02 19:15:32.077 [INFO][3503] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.23.4/26] IPv6=[] ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" HandleID="k8s-pod-network.9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.082 [INFO][3477] k8s.go 383: Populated endpoint ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6e2378a-26af-4c59-819c-a41a1c7f7ece", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 15, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"", Pod:"csi-node-driver-fsrbh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e30035c2d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.082 [INFO][3477] k8s.go 384: Calico CNI using IPs: [192.168.23.4/32] ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.082 [INFO][3477] dataplane_linux.go 68: Setting the host side veth name to cali6e30035c2d7 ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.087 [INFO][3477] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.101 [INFO][3477] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b6e2378a-26af-4c59-819c-a41a1c7f7ece", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 15, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136", Pod:"csi-node-driver-fsrbh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6e30035c2d7", MAC:"92:2d:0c:65:6f:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:32.142727 env[1047]: 2023-10-02 19:15:32.129 [INFO][3477] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136" Namespace="calico-system" Pod="csi-node-driver-fsrbh" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-csi--node--driver--fsrbh-eth0" Oct 2 19:15:32.143000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.143000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3538 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383939653734666533616164343739303166393039306162316236 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3538 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383939653734666533616164343739303166393039306162316236 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.144000 audit: BPF prog-id=165 op=LOAD Oct 2 19:15:32.144000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0000a6510 items=0 ppid=3538 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383939653734666533616164343739303166393039306162316236 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.145000 audit: BPF prog-id=166 op=LOAD Oct 2 19:15:32.145000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0000a6558 items=0 ppid=3538 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383939653734666533616164343739303166393039306162316236 Oct 2 19:15:32.147000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:15:32.147000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { perfmon } for pid=3550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit[3550]: AVC avc: denied { bpf } for pid=3550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.148000 audit: BPF prog-id=167 op=LOAD Oct 2 19:15:32.148000 audit[3550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0000a6968 items=0 ppid=3538 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383939653734666533616164343739303166393039306162316236 Oct 2 19:15:32.158000 audit[3589]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3589 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:32.158000 audit[3589]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7ffc14390f70 a2=0 a3=7ffc14390f5c items=0 ppid=2929 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.158000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:32.171311 env[1047]: time="2023-10-02T19:15:32.171211699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:32.171311 env[1047]: time="2023-10-02T19:15:32.171305366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:32.171520 env[1047]: time="2023-10-02T19:15:32.171335933Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:32.171734 env[1047]: time="2023-10-02T19:15:32.171679831Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136 pid=3601 runtime=io.containerd.runc.v2 Oct 2 19:15:32.217177 systemd[1]: Started cri-containerd-9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136.scope. Oct 2 19:15:32.245000 audit[3638]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:15:32.245000 audit[3638]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7fff9f0cf430 a2=0 a3=7fff9f0cf41c items=0 ppid=2929 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.245000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:15:32.255059 env[1047]: time="2023-10-02T19:15:32.255002887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-njhdh,Uid:06d3a54f-8f15-484d-914c-7551aaf1bd77,Namespace:kube-system,Attempt:1,} returns sandbox id \"02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71\"" Oct 2 19:15:32.258020 env[1047]: time="2023-10-02T19:15:32.257979071Z" level=info msg="CreateContainer within sandbox \"02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.283000 audit: BPF prog-id=168 op=LOAD Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3601 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373465663631613836373766336666636635656333633238383536 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3601 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373465663631613836373766336666636635656333633238383536 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit: BPF prog-id=169 op=LOAD Oct 2 19:15:32.285000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024a40 items=0 ppid=3601 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373465663631613836373766336666636635656333633238383536 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit: BPF prog-id=170 op=LOAD Oct 2 19:15:32.285000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024a88 items=0 ppid=3601 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373465663631613836373766336666636635656333633238383536 Oct 2 19:15:32.285000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:15:32.285000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { perfmon } for pid=3613 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.285000 audit: BPF prog-id=171 op=LOAD Oct 2 19:15:32.285000 audit[3613]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024e98 items=0 ppid=3601 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931373465663631613836373766336666636635656333633238383536 Oct 2 19:15:32.307125 env[1047]: time="2023-10-02T19:15:32.307071686Z" level=info msg="CreateContainer within sandbox \"02899e74fe3aad47901f9090ab1b6fe37dfd90f1914178ff123a23345afe4a71\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7baf8912eab2ff070e2ec0355557d02ff4c7af7510e2e1e84d49329021be3412\"" Oct 2 19:15:32.309633 env[1047]: time="2023-10-02T19:15:32.309604765Z" level=info msg="StartContainer for \"7baf8912eab2ff070e2ec0355557d02ff4c7af7510e2e1e84d49329021be3412\"" Oct 2 19:15:32.309849 env[1047]: time="2023-10-02T19:15:32.309798440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fsrbh,Uid:b6e2378a-26af-4c59-819c-a41a1c7f7ece,Namespace:calico-system,Attempt:1,} returns sandbox id \"9174ef61a8677f3ffcf5ec3c2885686d44bea5547288727ff3c4641cc769c136\"" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.189 [WARNING][3569] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"29552fe2-6b0e-4198-ae90-d05a92dcfa56", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03", Pod:"calico-kube-controllers-74b9887bb6-b75rs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.23.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3aeddf0d244", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.189 [INFO][3569] k8s.go 576: Cleaning up netns ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.190 [INFO][3569] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" iface="eth0" netns="" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.190 [INFO][3569] k8s.go 583: Releasing IP address(es) ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.190 [INFO][3569] utils.go 196: Calico CNI releasing IP address ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.301 [INFO][3623] ipam_plugin.go 416: Releasing address using handleID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.324798 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:32.324798 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.318 [WARNING][3623] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.318 [INFO][3623] ipam_plugin.go 444: Releasing address using workloadID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.324798 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:32.324798 env[1047]: 2023-10-02 19:15:32.322 [INFO][3569] k8s.go 589: Teardown processing complete. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.325442 env[1047]: time="2023-10-02T19:15:32.325392342Z" level=info msg="TearDown network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" successfully" Oct 2 19:15:32.325529 env[1047]: time="2023-10-02T19:15:32.325509863Z" level=info msg="StopPodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" returns successfully" Oct 2 19:15:32.326307 env[1047]: time="2023-10-02T19:15:32.326266056Z" level=info msg="RemovePodSandbox for \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" Oct 2 19:15:32.326360 env[1047]: time="2023-10-02T19:15:32.326315248Z" level=info msg="Forcibly stopping sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\"" Oct 2 19:15:32.347235 systemd[1]: Started cri-containerd-7baf8912eab2ff070e2ec0355557d02ff4c7af7510e2e1e84d49329021be3412.scope. Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.373000 audit: BPF prog-id=172 op=LOAD Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3538 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762616638393132656162326666303730653265633033353535353764 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3538 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762616638393132656162326666303730653265633033353535353764 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.374000 audit: BPF prog-id=173 op=LOAD Oct 2 19:15:32.374000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002216d0 items=0 ppid=3538 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762616638393132656162326666303730653265633033353535353764 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.377000 audit: BPF prog-id=174 op=LOAD Oct 2 19:15:32.377000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000221718 items=0 ppid=3538 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762616638393132656162326666303730653265633033353535353764 Oct 2 19:15:32.379000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:15:32.380000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:32.380000 audit: BPF prog-id=175 op=LOAD Oct 2 19:15:32.380000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000221b28 items=0 ppid=3538 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762616638393132656162326666303730653265633033353535353764 Oct 2 19:15:32.430997 env[1047]: time="2023-10-02T19:15:32.430824135Z" level=info msg="StartContainer for \"7baf8912eab2ff070e2ec0355557d02ff4c7af7510e2e1e84d49329021be3412\" returns successfully" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.410 [WARNING][3682] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"29552fe2-6b0e-4198-ae90-d05a92dcfa56", ResourceVersion:"693", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 14, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03", Pod:"calico-kube-controllers-74b9887bb6-b75rs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.23.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3aeddf0d244", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.410 [INFO][3682] k8s.go 576: Cleaning up netns ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.410 [INFO][3682] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" iface="eth0" netns="" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.411 [INFO][3682] k8s.go 583: Releasing IP address(es) ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.411 [INFO][3682] utils.go 196: Calico CNI releasing IP address ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.474 [INFO][3711] ipam_plugin.go 416: Releasing address using handleID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.489502 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:15:32.489502 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.483 [WARNING][3711] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.483 [INFO][3711] ipam_plugin.go 444: Releasing address using workloadID ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" HandleID="k8s-pod-network.46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--kube--controllers--74b9887bb6--b75rs-eth0" Oct 2 19:15:32.489502 env[1047]: time="2023-10-02T19:15:32Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:15:32.489502 env[1047]: 2023-10-02 19:15:32.487 [INFO][3682] k8s.go 589: Teardown processing complete. ContainerID="46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073" Oct 2 19:15:32.490390 env[1047]: time="2023-10-02T19:15:32.490335106Z" level=info msg="TearDown network for sandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" successfully" Oct 2 19:15:32.530759 env[1047]: time="2023-10-02T19:15:32.530700289Z" level=info msg="RemovePodSandbox \"46ef9949c59864193cb76ea6647b8dafa80178ef2eadd9e2c46df8b1cf7b1073\" returns successfully" Oct 2 19:15:32.670824 systemd-networkd[973]: cali3aeddf0d244: Gained IPv6LL Oct 2 19:15:32.698331 kubelet[1929]: I1002 19:15:32.696743 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-njhdh" podStartSLOduration=46.69668701 podCreationTimestamp="2023-10-02 19:14:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:32.696165619 +0000 UTC m=+61.550361167" watchObservedRunningTime="2023-10-02 19:15:32.69668701 +0000 UTC m=+61.550882549" Oct 2 19:15:32.750000 audit[3721]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:32.750000 audit[3721]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff94cadb60 a2=0 a3=7fff94cadb4c items=0 ppid=2106 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:32.752000 audit[3721]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:32.752000 audit[3721]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff94cadb60 a2=0 a3=7fff94cadb4c items=0 ppid=2106 pid=3721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:32.777000 audit[3723]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:32.777000 audit[3723]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffed219960 a2=0 a3=7fffed21994c items=0 ppid=2106 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:32.793000 audit[3723]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:15:32.793000 audit[3723]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fffed219960 a2=0 a3=7fffed21994c items=0 ppid=2106 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:32.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:15:32.995786 systemd-networkd[973]: calib622edd3e54: Gained IPv6LL Oct 2 19:15:33.374999 systemd-networkd[973]: cali6e30035c2d7: Gained IPv6LL Oct 2 19:15:34.918362 systemd[1]: run-containerd-runc-k8s.io-20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5-runc.zUxd2E.mount: Deactivated successfully. Oct 2 19:15:35.509156 env[1047]: time="2023-10-02T19:15:35.509116433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:35.512763 env[1047]: time="2023-10-02T19:15:35.512645686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:35.516493 env[1047]: time="2023-10-02T19:15:35.516461359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:35.522277 env[1047]: time="2023-10-02T19:15:35.522212444Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:35.524488 env[1047]: time="2023-10-02T19:15:35.524409189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:15:35.531132 env[1047]: time="2023-10-02T19:15:35.531103630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:15:35.534845 env[1047]: time="2023-10-02T19:15:35.534804807Z" level=info msg="CreateContainer within sandbox \"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:15:35.552193 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325427193.mount: Deactivated successfully. Oct 2 19:15:35.564568 env[1047]: time="2023-10-02T19:15:35.564526764Z" level=info msg="CreateContainer within sandbox \"a5f03e73ef0ec91ec67941528d0c1294a39378b38444c77e5bbf0ef65a4d5c03\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1\"" Oct 2 19:15:35.567197 env[1047]: time="2023-10-02T19:15:35.566233938Z" level=info msg="StartContainer for \"48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1\"" Oct 2 19:15:35.591555 systemd[1]: Started cri-containerd-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1.scope. Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.610000 audit: BPF prog-id=176 op=LOAD Oct 2 19:15:35.611000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.611000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3324 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:35.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663365653237363432303935646332303930656162396339663531 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3324 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:35.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663365653237363432303935646332303930656162396339663531 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.612000 audit: BPF prog-id=177 op=LOAD Oct 2 19:15:35.612000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bc0a0 items=0 ppid=3324 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:35.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663365653237363432303935646332303930656162396339663531 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.613000 audit: BPF prog-id=178 op=LOAD Oct 2 19:15:35.613000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bc0e8 items=0 ppid=3324 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:35.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663365653237363432303935646332303930656162396339663531 Oct 2 19:15:35.613000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:15:35.613000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { perfmon } for pid=3757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit[3757]: AVC avc: denied { bpf } for pid=3757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:35.614000 audit: BPF prog-id=179 op=LOAD Oct 2 19:15:35.614000 audit[3757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc4f8 items=0 ppid=3324 pid=3757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:35.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663365653237363432303935646332303930656162396339663531 Oct 2 19:15:35.634558 env[1047]: time="2023-10-02T19:15:35.634506810Z" level=info msg="StartContainer for \"48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1\" returns successfully" Oct 2 19:15:35.717690 kubelet[1929]: I1002 19:15:35.715938 1929 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-b75rs" podStartSLOduration=38.015594468 podCreationTimestamp="2023-10-02 19:14:53 +0000 UTC" firstStartedPulling="2023-10-02 19:15:30.824901958 +0000 UTC m=+59.679097487" lastFinishedPulling="2023-10-02 19:15:35.525192062 +0000 UTC m=+64.379387640" observedRunningTime="2023-10-02 19:15:35.710602027 +0000 UTC m=+64.564797565" watchObservedRunningTime="2023-10-02 19:15:35.715884621 +0000 UTC m=+64.570080149" Oct 2 19:15:35.771194 env[1047]: time="2023-10-02T19:15:35.771045101Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:15:35.773255 env[1047]: time="2023-10-02T19:15:35.773194306Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:15:35.775335 kubelet[1929]: E1002 19:15:35.775271 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:15:35.775418 kubelet[1929]: E1002 19:15:35.775356 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:15:35.779694 kubelet[1929]: E1002 19:15:35.779579 1929 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:15:35.781180 env[1047]: time="2023-10-02T19:15:35.781128181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:15:36.026341 env[1047]: time="2023-10-02T19:15:36.026188152Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:15:36.028328 env[1047]: time="2023-10-02T19:15:36.028203145Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:15:36.028690 kubelet[1929]: E1002 19:15:36.028619 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:15:36.028850 kubelet[1929]: E1002 19:15:36.028711 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:15:36.028850 kubelet[1929]: E1002 19:15:36.028827 1929 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:15:36.029014 kubelet[1929]: E1002 19:15:36.028904 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:15:36.236790 systemd[1]: Started sshd@7-172.24.4.229:22-172.24.4.1:36652.service. Oct 2 19:15:36.243770 kernel: kauditd_printk_skb: 308 callbacks suppressed Oct 2 19:15:36.243945 kernel: audit: type=1130 audit(1696274136.237:1320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.229:22-172.24.4.1:36652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:36.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.229:22-172.24.4.1:36652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:36.702339 kubelet[1929]: E1002 19:15:36.702230 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:15:37.588000 audit[3816]: USER_ACCT pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.591872 sshd[3816]: Accepted publickey for core from 172.24.4.1 port 36652 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:15:37.593000 audit[3816]: CRED_ACQ pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.598495 kernel: audit: type=1101 audit(1696274137.588:1321): pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.598570 kernel: audit: type=1103 audit(1696274137.593:1322): pid=3816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.598597 kernel: audit: type=1006 audit(1696274137.593:1323): pid=3816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:15:37.599406 sshd[3816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:37.601953 kernel: audit: type=1300 audit(1696274137.593:1323): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff896dabe0 a2=3 a3=0 items=0 ppid=1 pid=3816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:37.593000 audit[3816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff896dabe0 a2=3 a3=0 items=0 ppid=1 pid=3816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:37.606889 kernel: audit: type=1327 audit(1696274137.593:1323): proctitle=737368643A20636F7265205B707269765D Oct 2 19:15:37.593000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:15:37.616045 systemd-logind[1041]: New session 8 of user core. Oct 2 19:15:37.619033 systemd[1]: Started session-8.scope. Oct 2 19:15:37.626000 audit[3816]: USER_START pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.633456 kernel: audit: type=1105 audit(1696274137.626:1324): pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.633652 kernel: audit: type=1103 audit(1696274137.632:1325): pid=3858 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:37.632000 audit[3858]: CRED_ACQ pid=3858 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:38.384435 sshd[3816]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:38.385000 audit[3816]: USER_END pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:38.398868 kernel: audit: type=1106 audit(1696274138.385:1326): pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:38.398999 kernel: audit: type=1104 audit(1696274138.386:1327): pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:38.386000 audit[3816]: CRED_DISP pid=3816 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:38.390240 systemd-logind[1041]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:15:38.392148 systemd[1]: sshd@7-172.24.4.229:22-172.24.4.1:36652.service: Deactivated successfully. Oct 2 19:15:38.393873 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:15:38.397299 systemd-logind[1041]: Removed session 8. Oct 2 19:15:38.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.229:22-172.24.4.1:36652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:42.427000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.431269 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:15:42.431460 kernel: audit: type=1400 audit(1696274142.427:1329): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.427000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014606e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.454345 kernel: audit: type=1300 audit(1696274142.427:1329): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014606e0 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.454497 kernel: audit: type=1327 audit(1696274142.427:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.427000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.440000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.440000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7100 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.488882 kernel: audit: type=1400 audit(1696274142.440:1330): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.489046 kernel: audit: type=1300 audit(1696274142.440:1330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7100 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.440000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.500765 kernel: audit: type=1327 audit(1696274142.440:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.443000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.509519 kernel: audit: type=1400 audit(1696274142.443:1331): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.509644 kernel: audit: type=1300 audit(1696274142.443:1331): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7260 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.443000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7260 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.515056 kernel: audit: type=1327 audit(1696274142.443:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:42.446000 audit[1817]: AVC avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.524327 kernel: audit: type=1400 audit(1696274142.446:1332): avc: denied { watch } for pid=1817 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=523385 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:42.446000 audit[1817]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fc7280 a2=fc6 a3=0 items=0 ppid=1667 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c1006 key=(null) Oct 2 19:15:42.446000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:44.901738 systemd[1]: run-containerd-runc-k8s.io-20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5-runc.QdLfaK.mount: Deactivated successfully. Oct 2 19:15:47.583795 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.nhQq89.mount: Deactivated successfully. Oct 2 19:15:47.662990 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.ms5ncm.mount: Deactivated successfully. Oct 2 19:15:48.403376 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:15:48.403611 kernel: audit: type=1130 audit(1696274148.397:1333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.229:22-172.24.4.1:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:48.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.229:22-172.24.4.1:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:48.397843 systemd[1]: Started sshd@8-172.24.4.229:22-172.24.4.1:39818.service. Oct 2 19:15:49.640457 sshd[3947]: Accepted publickey for core from 172.24.4.1 port 39818 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:15:49.639000 audit[3947]: USER_ACCT pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.651741 kernel: audit: type=1101 audit(1696274149.639:1334): pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.650000 audit[3947]: CRED_ACQ pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.662788 kernel: audit: type=1103 audit(1696274149.650:1335): pid=3947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.662962 sshd[3947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:49.671419 kernel: audit: type=1006 audit(1696274149.650:1336): pid=3947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:15:49.671584 kernel: audit: type=1300 audit(1696274149.650:1336): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcec82e810 a2=3 a3=0 items=0 ppid=1 pid=3947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:49.650000 audit[3947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcec82e810 a2=3 a3=0 items=0 ppid=1 pid=3947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:49.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:15:49.686752 kernel: audit: type=1327 audit(1696274149.650:1336): proctitle=737368643A20636F7265205B707269765D Oct 2 19:15:49.697524 systemd[1]: Started session-9.scope. Oct 2 19:15:49.698802 systemd-logind[1041]: New session 9 of user core. Oct 2 19:15:49.713000 audit[3947]: USER_START pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.728062 kernel: audit: type=1105 audit(1696274149.713:1337): pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.727000 audit[3950]: CRED_ACQ pid=3950 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:49.738871 kernel: audit: type=1103 audit(1696274149.727:1338): pid=3950 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:50.432338 sshd[3947]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:50.433000 audit[3947]: USER_END pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:50.447322 kernel: audit: type=1106 audit(1696274150.433:1339): pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:50.447395 kernel: audit: type=1104 audit(1696274150.438:1340): pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:50.438000 audit[3947]: CRED_DISP pid=3947 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:15:50.444094 systemd[1]: sshd@8-172.24.4.229:22-172.24.4.1:39818.service: Deactivated successfully. Oct 2 19:15:50.448175 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:15:50.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.229:22-172.24.4.1:39818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:50.450729 systemd-logind[1041]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:15:50.452717 systemd-logind[1041]: Removed session 9. Oct 2 19:15:51.316113 env[1047]: time="2023-10-02T19:15:51.316009232Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:15:51.568299 env[1047]: time="2023-10-02T19:15:51.567889121Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:15:51.628294 env[1047]: time="2023-10-02T19:15:51.628142761Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:15:51.629284 kubelet[1929]: E1002 19:15:51.629193 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:15:51.630091 kubelet[1929]: E1002 19:15:51.629335 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:15:51.633003 kubelet[1929]: E1002 19:15:51.630474 1929 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:15:51.636276 env[1047]: time="2023-10-02T19:15:51.634568403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:15:51.898698 env[1047]: time="2023-10-02T19:15:51.898513417Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:15:51.901018 env[1047]: time="2023-10-02T19:15:51.900902058Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:15:51.901898 kubelet[1929]: E1002 19:15:51.901825 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:15:51.902058 kubelet[1929]: E1002 19:15:51.901934 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:15:51.902210 kubelet[1929]: E1002 19:15:51.902116 1929 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:15:51.902488 kubelet[1929]: E1002 19:15:51.902246 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:15:54.878490 systemd[1]: run-containerd-runc-k8s.io-20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5-runc.cw7BAp.mount: Deactivated successfully. Oct 2 19:15:57.631599 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.vLQo5S.mount: Deactivated successfully. Oct 2 19:16:00.447133 systemd[1]: Started sshd@9-172.24.4.229:22-172.24.4.1:38034.service. Oct 2 19:16:00.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.229:22-172.24.4.1:38034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:00.451956 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:16:00.452118 kernel: audit: type=1130 audit(1696274160.447:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.229:22-172.24.4.1:38034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.692000 audit[4036]: USER_ACCT pid=4036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.704442 sshd[4036]: Accepted publickey for core from 172.24.4.1 port 38034 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:16:01.705315 kernel: audit: type=1101 audit(1696274161.692:1343): pid=4036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.703000 audit[4036]: CRED_ACQ pid=4036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.722954 kernel: audit: type=1103 audit(1696274161.703:1344): pid=4036 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.723250 kernel: audit: type=1006 audit(1696274161.704:1345): pid=4036 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:16:01.723332 kernel: audit: type=1300 audit(1696274161.704:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1157afc0 a2=3 a3=0 items=0 ppid=1 pid=4036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:01.704000 audit[4036]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1157afc0 a2=3 a3=0 items=0 ppid=1 pid=4036 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:01.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:01.734909 sshd[4036]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:01.738279 kernel: audit: type=1327 audit(1696274161.704:1345): proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:01.755708 systemd-logind[1041]: New session 10 of user core. Oct 2 19:16:01.760141 systemd[1]: Started session-10.scope. Oct 2 19:16:01.776000 audit[4036]: USER_START pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.789749 kernel: audit: type=1105 audit(1696274161.776:1346): pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.790000 audit[4039]: CRED_ACQ pid=4039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:01.798730 kernel: audit: type=1103 audit(1696274161.790:1347): pid=4039 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:02.544807 sshd[4036]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:02.546000 audit[4036]: USER_END pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:02.554271 systemd[1]: sshd@9-172.24.4.229:22-172.24.4.1:38034.service: Deactivated successfully. Oct 2 19:16:02.558158 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:16:02.546000 audit[4036]: CRED_DISP pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:02.569903 kernel: audit: type=1106 audit(1696274162.546:1348): pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:02.570094 kernel: audit: type=1104 audit(1696274162.546:1349): pid=4036 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:02.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.229:22-172.24.4.1:38034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:02.571168 systemd-logind[1041]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:16:02.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.229:22-172.24.4.1:38036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:02.574122 systemd[1]: Started sshd@10-172.24.4.229:22-172.24.4.1:38036.service. Oct 2 19:16:02.578137 systemd-logind[1041]: Removed session 10. Oct 2 19:16:03.937000 audit[4051]: USER_ACCT pid=4051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:03.938889 sshd[4051]: Accepted publickey for core from 172.24.4.1 port 38036 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:16:03.940000 audit[4051]: CRED_ACQ pid=4051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:03.940000 audit[4051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe02332ff0 a2=3 a3=0 items=0 ppid=1 pid=4051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:03.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:03.942460 sshd[4051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:03.955185 systemd[1]: Started session-11.scope. Oct 2 19:16:03.956088 systemd-logind[1041]: New session 11 of user core. Oct 2 19:16:03.969000 audit[4051]: USER_START pid=4051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:03.973000 audit[4053]: CRED_ACQ pid=4053 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:05.168602 sshd[4051]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:05.172000 audit[4051]: USER_END pid=4051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:05.172000 audit[4051]: CRED_DISP pid=4051 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:05.176046 systemd[1]: sshd@10-172.24.4.229:22-172.24.4.1:38036.service: Deactivated successfully. Oct 2 19:16:05.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.229:22-172.24.4.1:38036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.177650 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:16:05.179705 systemd-logind[1041]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:16:05.184385 systemd[1]: Started sshd@11-172.24.4.229:22-172.24.4.1:37456.service. Oct 2 19:16:05.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.229:22-172.24.4.1:37456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.187751 systemd-logind[1041]: Removed session 11. Oct 2 19:16:05.316913 kubelet[1929]: E1002 19:16:05.316829 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:16:06.433086 sshd[4082]: Accepted publickey for core from 172.24.4.1 port 37456 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:16:06.432000 audit[4082]: USER_ACCT pid=4082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.434540 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:16:06.434714 kernel: audit: type=1101 audit(1696274166.432:1361): pid=4082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.440000 audit[4082]: CRED_ACQ pid=4082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.442257 sshd[4082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:06.451097 kernel: audit: type=1103 audit(1696274166.440:1362): pid=4082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.451245 kernel: audit: type=1006 audit(1696274166.440:1363): pid=4082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:16:06.451301 kernel: audit: type=1300 audit(1696274166.440:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd158b6050 a2=3 a3=0 items=0 ppid=1 pid=4082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:06.440000 audit[4082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd158b6050 a2=3 a3=0 items=0 ppid=1 pid=4082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:06.454549 systemd[1]: Started session-12.scope. Oct 2 19:16:06.457030 kernel: audit: type=1327 audit(1696274166.440:1363): proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:06.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:06.456773 systemd-logind[1041]: New session 12 of user core. Oct 2 19:16:06.469000 audit[4082]: USER_START pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.472000 audit[4084]: CRED_ACQ pid=4084 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.479820 kernel: audit: type=1105 audit(1696274166.469:1364): pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:06.479945 kernel: audit: type=1103 audit(1696274166.472:1365): pid=4084 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:07.264012 sshd[4082]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:07.265000 audit[4082]: USER_END pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:07.271055 systemd[1]: sshd@11-172.24.4.229:22-172.24.4.1:37456.service: Deactivated successfully. Oct 2 19:16:07.274024 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:16:07.266000 audit[4082]: CRED_DISP pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:07.291232 kernel: audit: type=1106 audit(1696274167.265:1366): pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:07.291386 kernel: audit: type=1104 audit(1696274167.266:1367): pid=4082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:07.291289 systemd-logind[1041]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:16:07.292719 kernel: audit: type=1131 audit(1696274167.266:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.229:22-172.24.4.1:37456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.229:22-172.24.4.1:37456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.302584 systemd-logind[1041]: Removed session 12. Oct 2 19:16:07.591747 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.5c4uTE.mount: Deactivated successfully. Oct 2 19:16:07.643000 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.XDpMSe.mount: Deactivated successfully. Oct 2 19:16:13.115000 audit[4136]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.115000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcf08964f0 a2=0 a3=7ffcf08964dc items=0 ppid=2106 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.126129 kernel: audit: type=1325 audit(1696274173.115:1369): table=filter:113 family=2 entries=9 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.126264 kernel: audit: type=1300 audit(1696274173.115:1369): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcf08964f0 a2=0 a3=7ffcf08964dc items=0 ppid=2106 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.136683 kernel: audit: type=1327 audit(1696274173.115:1369): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.135000 audit[4136]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.135000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcf08964f0 a2=0 a3=7ffcf08964dc items=0 ppid=2106 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.145618 kernel: audit: type=1325 audit(1696274173.135:1370): table=nat:114 family=2 entries=20 op=nft_register_rule pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.145766 kernel: audit: type=1300 audit(1696274173.135:1370): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcf08964f0 a2=0 a3=7ffcf08964dc items=0 ppid=2106 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.152695 kernel: audit: type=1327 audit(1696274173.135:1370): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.158000 audit[4138]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.158000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd8562fdd0 a2=0 a3=7ffd8562fdbc items=0 ppid=2106 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.169135 kernel: audit: type=1325 audit(1696274173.158:1371): table=filter:115 family=2 entries=10 op=nft_register_rule pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.169275 kernel: audit: type=1300 audit(1696274173.158:1371): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd8562fdd0 a2=0 a3=7ffd8562fdbc items=0 ppid=2106 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.173716 kernel: audit: type=1327 audit(1696274173.158:1371): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.174359 kubelet[1929]: I1002 19:16:13.174320 1929 topology_manager.go:215] "Topology Admit Handler" podUID="af174d13-7c65-443d-8c52-ad2fb966491e" podNamespace="calico-apiserver" podName="calico-apiserver-57f6768768-njwdr" Oct 2 19:16:13.174000 audit[4138]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.180256 kernel: audit: type=1325 audit(1696274173.174:1372): table=nat:116 family=2 entries=20 op=nft_register_rule pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.174000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd8562fdd0 a2=0 a3=7ffd8562fdbc items=0 ppid=2106 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.184689 systemd[1]: Created slice kubepods-besteffort-podaf174d13_7c65_443d_8c52_ad2fb966491e.slice. Oct 2 19:16:13.214285 kubelet[1929]: I1002 19:16:13.214244 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/af174d13-7c65-443d-8c52-ad2fb966491e-calico-apiserver-certs\") pod \"calico-apiserver-57f6768768-njwdr\" (UID: \"af174d13-7c65-443d-8c52-ad2fb966491e\") " pod="calico-apiserver/calico-apiserver-57f6768768-njwdr" Oct 2 19:16:13.214604 kubelet[1929]: I1002 19:16:13.214591 1929 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tft9g\" (UniqueName: \"kubernetes.io/projected/af174d13-7c65-443d-8c52-ad2fb966491e-kube-api-access-tft9g\") pod \"calico-apiserver-57f6768768-njwdr\" (UID: \"af174d13-7c65-443d-8c52-ad2fb966491e\") " pod="calico-apiserver/calico-apiserver-57f6768768-njwdr" Oct 2 19:16:13.489469 env[1047]: time="2023-10-02T19:16:13.489021998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f6768768-njwdr,Uid:af174d13-7c65-443d-8c52-ad2fb966491e,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:16:13.713186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:16:13.713347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f9c476dc80: link becomes ready Oct 2 19:16:13.722624 systemd-networkd[973]: cali6f9c476dc80: Link UP Oct 2 19:16:13.722644 systemd-networkd[973]: cali6f9c476dc80: Gained carrier Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.626 [INFO][4141] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0 calico-apiserver-57f6768768- calico-apiserver af174d13-7c65-443d-8c52-ad2fb966491e 989 0 2023-10-02 19:16:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57f6768768 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-0-b-c273fa9e33.novalocal calico-apiserver-57f6768768-njwdr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6f9c476dc80 [] []}} ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.626 [INFO][4141] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.660 [INFO][4152] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" HandleID="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.673 [INFO][4152] ipam_plugin.go 269: Auto assigning IP ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" HandleID="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002110b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-0-b-c273fa9e33.novalocal", "pod":"calico-apiserver-57f6768768-njwdr", "timestamp":"2023-10-02 19:16:13.660438243 +0000 UTC"}, Hostname:"ci-3510-3-0-b-c273fa9e33.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:13.743952 env[1047]: time="2023-10-02T19:16:13Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:13.743952 env[1047]: time="2023-10-02T19:16:13Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.673 [INFO][4152] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-0-b-c273fa9e33.novalocal' Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.676 [INFO][4152] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.681 [INFO][4152] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.686 [INFO][4152] ipam.go 489: Trying affinity for 192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.688 [INFO][4152] ipam.go 155: Attempting to load block cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.691 [INFO][4152] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.0/26 host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.691 [INFO][4152] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.0/26 handle="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.693 [INFO][4152] ipam.go 1682: Creating new handle: k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.700 [INFO][4152] ipam.go 1203: Writing block in order to claim IPs block=192.168.23.0/26 handle="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.707 [INFO][4152] ipam.go 1216: Successfully claimed IPs: [192.168.23.5/26] block=192.168.23.0/26 handle="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.707 [INFO][4152] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.5/26] handle="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" host="ci-3510-3-0-b-c273fa9e33.novalocal" Oct 2 19:16:13.743952 env[1047]: time="2023-10-02T19:16:13Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:13.743952 env[1047]: 2023-10-02 19:16:13.707 [INFO][4152] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.23.5/26] IPv6=[] ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" HandleID="k8s-pod-network.27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Workload="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.709 [INFO][4141] k8s.go 383: Populated endpoint ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0", GenerateName:"calico-apiserver-57f6768768-", Namespace:"calico-apiserver", SelfLink:"", UID:"af174d13-7c65-443d-8c52-ad2fb966491e", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f6768768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"", Pod:"calico-apiserver-57f6768768-njwdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.23.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f9c476dc80", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.709 [INFO][4141] k8s.go 384: Calico CNI using IPs: [192.168.23.5/32] ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.709 [INFO][4141] dataplane_linux.go 68: Setting the host side veth name to cali6f9c476dc80 ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.713 [INFO][4141] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.722 [INFO][4141] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0", GenerateName:"calico-apiserver-57f6768768-", Namespace:"calico-apiserver", SelfLink:"", UID:"af174d13-7c65-443d-8c52-ad2fb966491e", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f6768768", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-0-b-c273fa9e33.novalocal", ContainerID:"27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac", Pod:"calico-apiserver-57f6768768-njwdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.23.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6f9c476dc80", MAC:"92:64:1f:c7:1d:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:13.744823 env[1047]: 2023-10-02 19:16:13.740 [INFO][4141] k8s.go 489: Wrote updated endpoint to datastore ContainerID="27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac" Namespace="calico-apiserver" Pod="calico-apiserver-57f6768768-njwdr" WorkloadEndpoint="ci--3510--3--0--b--c273fa9e33.novalocal-k8s-calico--apiserver--57f6768768--njwdr-eth0" Oct 2 19:16:13.762679 env[1047]: time="2023-10-02T19:16:13.762569848Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:13.762679 env[1047]: time="2023-10-02T19:16:13.762647173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:13.762868 env[1047]: time="2023-10-02T19:16:13.762693049Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:13.762868 env[1047]: time="2023-10-02T19:16:13.762833714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac pid=4177 runtime=io.containerd.runc.v2 Oct 2 19:16:13.781896 systemd[1]: Started cri-containerd-27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac.scope. Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.808000 audit: BPF prog-id=180 op=LOAD Oct 2 19:16:13.808000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.808000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4177 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237613435663165376531656566333630653235386438623130636335 Oct 2 19:16:13.808000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.808000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4177 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237613435663165376531656566333630653235386438623130636335 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit: BPF prog-id=181 op=LOAD Oct 2 19:16:13.809000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ae0 items=0 ppid=4177 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237613435663165376531656566333630653235386438623130636335 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit: BPF prog-id=182 op=LOAD Oct 2 19:16:13.809000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024b28 items=0 ppid=4177 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237613435663165376531656566333630653235386438623130636335 Oct 2 19:16:13.809000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:16:13.809000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.809000 audit: BPF prog-id=183 op=LOAD Oct 2 19:16:13.809000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024f38 items=0 ppid=4177 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237613435663165376531656566333630653235386438623130636335 Oct 2 19:16:13.847000 audit[4213]: NETFILTER_CFG table=filter:117 family=2 entries=65 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:13.847000 audit[4213]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffd986c1590 a2=0 a3=7ffd986c157c items=0 ppid=2929 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.847000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:13.860943 env[1047]: time="2023-10-02T19:16:13.860890685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f6768768-njwdr,Uid:af174d13-7c65-443d-8c52-ad2fb966491e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"27a45f1e7e1eef360e258d8b10cc5bc0a90ae214eb6845243365966419e956ac\"" Oct 2 19:16:13.863942 env[1047]: time="2023-10-02T19:16:13.863912261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:16:14.124026 env[1047]: time="2023-10-02T19:16:14.123909799Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:14.127459 env[1047]: time="2023-10-02T19:16:14.127407370Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:14.128191 kubelet[1929]: E1002 19:16:14.128096 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:14.128327 kubelet[1929]: E1002 19:16:14.128268 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:14.128841 kubelet[1929]: E1002 19:16:14.128715 1929 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tft9g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-57f6768768-njwdr_calico-apiserver(af174d13-7c65-443d-8c52-ad2fb966491e): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:14.129023 kubelet[1929]: E1002 19:16:14.128902 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-57f6768768-njwdr" podUID="af174d13-7c65-443d-8c52-ad2fb966491e" Oct 2 19:16:14.869928 kubelet[1929]: E1002 19:16:14.869884 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-57f6768768-njwdr" podUID="af174d13-7c65-443d-8c52-ad2fb966491e" Oct 2 19:16:14.912858 systemd[1]: run-containerd-runc-k8s.io-20adb6051b6911d1cb3b54c260cf5b8fa50aa17cb7e611ea1794a5624d2eddd5-runc.NiVBq5.mount: Deactivated successfully. Oct 2 19:16:14.953000 audit[4239]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:14.953000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc00458420 a2=0 a3=7ffc0045840c items=0 ppid=2106 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:14.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:14.956000 audit[4239]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:14.956000 audit[4239]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc00458420 a2=0 a3=7ffc0045840c items=0 ppid=2106 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:14.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:15.550118 systemd-networkd[973]: cali6f9c476dc80: Gained IPv6LL Oct 2 19:16:15.876916 kubelet[1929]: E1002 19:16:15.874125 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-57f6768768-njwdr" podUID="af174d13-7c65-443d-8c52-ad2fb966491e" Oct 2 19:16:15.971000 audit[4249]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:15.971000 audit[4249]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc5de03d60 a2=0 a3=7ffc5de03d4c items=0 ppid=2106 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:15.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:15.973000 audit[4249]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:15.973000 audit[4249]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc5de03d60 a2=0 a3=7ffc5de03d4c items=0 ppid=2106 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:15.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:16.311090 env[1047]: time="2023-10-02T19:16:16.311036809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:16:16.564999 env[1047]: time="2023-10-02T19:16:16.564719503Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:16.566960 env[1047]: time="2023-10-02T19:16:16.566816943Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:16.567508 kubelet[1929]: E1002 19:16:16.567393 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:16:16.567508 kubelet[1929]: E1002 19:16:16.567508 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:16:16.568505 kubelet[1929]: E1002 19:16:16.568436 1929 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:16.571291 env[1047]: time="2023-10-02T19:16:16.570619346Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:16:16.820241 env[1047]: time="2023-10-02T19:16:16.820040935Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:16.823023 env[1047]: time="2023-10-02T19:16:16.822941494Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:16.823770 kubelet[1929]: E1002 19:16:16.823734 1929 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:16:16.824013 kubelet[1929]: E1002 19:16:16.823989 1929 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:16:16.824380 kubelet[1929]: E1002 19:16:16.824346 1929 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wd5tt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-fsrbh_calico-system(b6e2378a-26af-4c59-819c-a41a1c7f7ece): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:16.824895 kubelet[1929]: E1002 19:16:16.824861 1929 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-fsrbh" podUID="b6e2378a-26af-4c59-819c-a41a1c7f7ece" Oct 2 19:16:17.275546 systemd[1]: Started sshd@12-172.24.4.229:22-172.24.4.1:59604.service. Oct 2 19:16:17.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.229:22-172.24.4.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.573057 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.itCmMd.mount: Deactivated successfully. Oct 2 19:16:17.621390 systemd[1]: run-containerd-runc-k8s.io-48f3ee27642095dc2090eab9c9f51b74393e94861a4983d581bc5740b8e653f1-runc.jUpCPf.mount: Deactivated successfully. Oct 2 19:16:18.692424 sshd[4251]: Accepted publickey for core from 172.24.4.1 port 59604 ssh2: RSA SHA256:Bv3eaC0v7VyviMzATjRnqd9o1H3jZsSCHmhEaYGNTBQ Oct 2 19:16:18.705614 kernel: kauditd_printk_skb: 75 callbacks suppressed Oct 2 19:16:18.705818 kernel: audit: type=1101 audit(1696274178.690:1397): pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.690000 audit[4251]: USER_ACCT pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.691000 audit[4251]: CRED_ACQ pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.710981 sshd[4251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:18.716796 kernel: audit: type=1103 audit(1696274178.691:1398): pid=4251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.718653 kernel: audit: type=1006 audit(1696274178.691:1399): pid=4251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:16:18.691000 audit[4251]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd536202f0 a2=3 a3=0 items=0 ppid=1 pid=4251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.733877 kernel: audit: type=1300 audit(1696274178.691:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd536202f0 a2=3 a3=0 items=0 ppid=1 pid=4251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.734036 kernel: audit: type=1327 audit(1696274178.691:1399): proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:18.691000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:18.746010 systemd[1]: Started session-13.scope. Oct 2 19:16:18.746761 systemd-logind[1041]: New session 13 of user core. Oct 2 19:16:18.761000 audit[4251]: USER_START pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.781698 kernel: audit: type=1105 audit(1696274178.761:1400): pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.781000 audit[4301]: CRED_ACQ pid=4301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:18.786880 kernel: audit: type=1103 audit(1696274178.781:1401): pid=4301 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:19.542154 sshd[4251]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:19.543000 audit[4251]: USER_END pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:19.548454 systemd[1]: sshd@12-172.24.4.229:22-172.24.4.1:59604.service: Deactivated successfully. Oct 2 19:16:19.550104 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:16:19.558708 kernel: audit: type=1106 audit(1696274179.543:1402): pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:19.543000 audit[4251]: CRED_DISP pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:19.569776 kernel: audit: type=1104 audit(1696274179.543:1403): pid=4251 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Oct 2 19:16:19.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.229:22-172.24.4.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:19.580229 systemd-logind[1041]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:16:19.580783 kernel: audit: type=1131 audit(1696274179.544:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.229:22-172.24.4.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:19.582370 systemd-logind[1041]: Removed session 13.