Feb 9 09:00:47.082862 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 09:00:47.082904 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:00:47.082924 kernel: BIOS-provided physical RAM map: Feb 9 09:00:47.082935 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 09:00:47.082946 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 09:00:47.082958 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 09:00:47.082972 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 9 09:00:47.082985 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 9 09:00:47.083000 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 09:00:47.083011 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 09:00:47.083022 kernel: NX (Execute Disable) protection: active Feb 9 09:00:47.083033 kernel: SMBIOS 2.8 present. Feb 9 09:00:47.083043 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 9 09:00:47.083054 kernel: Hypervisor detected: KVM Feb 9 09:00:47.083068 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 09:00:47.083085 kernel: kvm-clock: cpu 0, msr 6dfaa001, primary cpu clock Feb 9 09:00:47.083097 kernel: kvm-clock: using sched offset of 4427948373 cycles Feb 9 09:00:47.083110 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 09:00:47.083122 kernel: tsc: Detected 2494.140 MHz processor Feb 9 09:00:47.083134 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 09:00:47.083147 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 09:00:47.083159 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 9 09:00:47.083173 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 09:00:47.083191 kernel: ACPI: Early table checksum verification disabled Feb 9 09:00:47.083204 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 9 09:00:47.083217 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.083229 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.083241 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.083253 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 09:00:47.083265 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.083276 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.088212 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.088283 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:00:47.088654 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 9 09:00:47.088669 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 9 09:00:47.088681 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 09:00:47.088693 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 9 09:00:47.088706 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 9 09:00:47.088719 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 9 09:00:47.088733 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 9 09:00:47.088766 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 09:00:47.088781 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 09:00:47.088793 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 09:00:47.088806 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 9 09:00:47.088820 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 9 09:00:47.088833 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 9 09:00:47.088852 kernel: Zone ranges: Feb 9 09:00:47.088867 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 09:00:47.088881 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 9 09:00:47.088895 kernel: Normal empty Feb 9 09:00:47.088908 kernel: Movable zone start for each node Feb 9 09:00:47.088922 kernel: Early memory node ranges Feb 9 09:00:47.088936 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 09:00:47.088952 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 9 09:00:47.088964 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 9 09:00:47.088981 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 09:00:47.088994 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 09:00:47.089007 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 9 09:00:47.089020 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 09:00:47.089035 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 09:00:47.089050 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 09:00:47.089064 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 09:00:47.089076 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 09:00:47.089085 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 09:00:47.089097 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 09:00:47.089106 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 09:00:47.089115 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 09:00:47.089123 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 09:00:47.089132 kernel: TSC deadline timer available Feb 9 09:00:47.089141 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 09:00:47.089152 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 09:00:47.089164 kernel: Booting paravirtualized kernel on KVM Feb 9 09:00:47.089176 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 09:00:47.089193 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 09:00:47.089206 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 09:00:47.089219 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 09:00:47.089232 kernel: pcpu-alloc: [0] 0 1 Feb 9 09:00:47.089244 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 09:00:47.089258 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 09:00:47.089270 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 9 09:00:47.089282 kernel: Policy zone: DMA32 Feb 9 09:00:47.089315 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:00:47.089330 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:00:47.089339 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:00:47.089348 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 09:00:47.089356 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:00:47.089365 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 09:00:47.090336 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:00:47.090394 kernel: Kernel/User page tables isolation: enabled Feb 9 09:00:47.090408 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 09:00:47.090432 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 09:00:47.090445 kernel: rcu: Hierarchical RCU implementation. Feb 9 09:00:47.090461 kernel: rcu: RCU event tracing is enabled. Feb 9 09:00:47.090475 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:00:47.090488 kernel: Rude variant of Tasks RCU enabled. Feb 9 09:00:47.090501 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:00:47.090515 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:00:47.090528 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:00:47.090541 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 09:00:47.090559 kernel: random: crng init done Feb 9 09:00:47.090571 kernel: Console: colour VGA+ 80x25 Feb 9 09:00:47.090584 kernel: printk: console [tty0] enabled Feb 9 09:00:47.090596 kernel: printk: console [ttyS0] enabled Feb 9 09:00:47.090608 kernel: ACPI: Core revision 20210730 Feb 9 09:00:47.090620 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 09:00:47.090633 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 09:00:47.090645 kernel: x2apic enabled Feb 9 09:00:47.090656 kernel: Switched APIC routing to physical x2apic. Feb 9 09:00:47.090675 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 09:00:47.090688 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Feb 9 09:00:47.090701 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) Feb 9 09:00:47.090713 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 09:00:47.090726 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 09:00:47.090739 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 09:00:47.090751 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 09:00:47.090763 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 09:00:47.090777 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 09:00:47.090795 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 9 09:00:47.090827 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 09:00:47.090845 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 09:00:47.090864 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 09:00:47.090878 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 09:00:47.090891 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 09:00:47.090904 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 09:00:47.090918 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 09:00:47.090930 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 09:00:47.090944 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 09:00:47.090964 kernel: Freeing SMP alternatives memory: 32K Feb 9 09:00:47.090979 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:00:47.090992 kernel: LSM: Security Framework initializing Feb 9 09:00:47.091006 kernel: SELinux: Initializing. Feb 9 09:00:47.091020 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 09:00:47.091034 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 09:00:47.091052 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 9 09:00:47.091066 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 09:00:47.091080 kernel: signal: max sigframe size: 1776 Feb 9 09:00:47.091093 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:00:47.091108 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 09:00:47.091122 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:00:47.091135 kernel: x86: Booting SMP configuration: Feb 9 09:00:47.091149 kernel: .... node #0, CPUs: #1 Feb 9 09:00:47.091161 kernel: kvm-clock: cpu 1, msr 6dfaa041, secondary cpu clock Feb 9 09:00:47.091175 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 09:00:47.091194 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:00:47.091207 kernel: smpboot: Max logical packages: 1 Feb 9 09:00:47.091220 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) Feb 9 09:00:47.091234 kernel: devtmpfs: initialized Feb 9 09:00:47.091248 kernel: x86/mm: Memory block size: 128MB Feb 9 09:00:47.091264 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:00:47.091281 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:00:47.091324 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:00:47.091337 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:00:47.091358 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:00:47.091374 kernel: audit: type=2000 audit(1707469246.811:1): state=initialized audit_enabled=0 res=1 Feb 9 09:00:47.091389 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:00:47.091403 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 09:00:47.091418 kernel: cpuidle: using governor menu Feb 9 09:00:47.091432 kernel: ACPI: bus type PCI registered Feb 9 09:00:47.091446 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:00:47.091461 kernel: dca service started, version 1.12.1 Feb 9 09:00:47.091476 kernel: PCI: Using configuration type 1 for base access Feb 9 09:00:47.091495 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 09:00:47.091509 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:00:47.091526 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:00:47.091543 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:00:47.091558 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:00:47.091572 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:00:47.091586 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:00:47.091600 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:00:47.091614 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:00:47.091635 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:00:47.091649 kernel: ACPI: Interpreter enabled Feb 9 09:00:47.091662 kernel: ACPI: PM: (supports S0 S5) Feb 9 09:00:47.091675 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 09:00:47.091690 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 09:00:47.091703 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 09:00:47.091717 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 09:00:47.092094 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 09:00:47.092367 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 09:00:47.092390 kernel: acpiphp: Slot [3] registered Feb 9 09:00:47.092405 kernel: acpiphp: Slot [4] registered Feb 9 09:00:47.092419 kernel: acpiphp: Slot [5] registered Feb 9 09:00:47.092433 kernel: acpiphp: Slot [6] registered Feb 9 09:00:47.092447 kernel: acpiphp: Slot [7] registered Feb 9 09:00:47.092461 kernel: acpiphp: Slot [8] registered Feb 9 09:00:47.092475 kernel: acpiphp: Slot [9] registered Feb 9 09:00:47.092496 kernel: acpiphp: Slot [10] registered Feb 9 09:00:47.092508 kernel: acpiphp: Slot [11] registered Feb 9 09:00:47.092522 kernel: acpiphp: Slot [12] registered Feb 9 09:00:47.092536 kernel: acpiphp: Slot [13] registered Feb 9 09:00:47.092550 kernel: acpiphp: Slot [14] registered Feb 9 09:00:47.092564 kernel: acpiphp: Slot [15] registered Feb 9 09:00:47.092577 kernel: acpiphp: Slot [16] registered Feb 9 09:00:47.092590 kernel: acpiphp: Slot [17] registered Feb 9 09:00:47.092604 kernel: acpiphp: Slot [18] registered Feb 9 09:00:47.092618 kernel: acpiphp: Slot [19] registered Feb 9 09:00:47.092637 kernel: acpiphp: Slot [20] registered Feb 9 09:00:47.092652 kernel: acpiphp: Slot [21] registered Feb 9 09:00:47.092668 kernel: acpiphp: Slot [22] registered Feb 9 09:00:47.092685 kernel: acpiphp: Slot [23] registered Feb 9 09:00:47.092700 kernel: acpiphp: Slot [24] registered Feb 9 09:00:47.092713 kernel: acpiphp: Slot [25] registered Feb 9 09:00:47.092727 kernel: acpiphp: Slot [26] registered Feb 9 09:00:47.092740 kernel: acpiphp: Slot [27] registered Feb 9 09:00:47.092754 kernel: acpiphp: Slot [28] registered Feb 9 09:00:47.092774 kernel: acpiphp: Slot [29] registered Feb 9 09:00:47.092789 kernel: acpiphp: Slot [30] registered Feb 9 09:00:47.092802 kernel: acpiphp: Slot [31] registered Feb 9 09:00:47.092817 kernel: PCI host bridge to bus 0000:00 Feb 9 09:00:47.093071 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 09:00:47.093232 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 09:00:47.109687 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 09:00:47.109921 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 09:00:47.110121 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 09:00:47.110312 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 09:00:47.110542 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 09:00:47.110794 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 09:00:47.110988 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 09:00:47.111164 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 9 09:00:47.111387 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 09:00:47.111570 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 09:00:47.111747 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 09:00:47.111936 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 09:00:47.112139 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 9 09:00:47.112341 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 9 09:00:47.112532 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 09:00:47.112720 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 09:00:47.112885 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 09:00:47.113078 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 09:00:47.113248 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 09:00:47.113470 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 09:00:47.113637 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 9 09:00:47.113822 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 09:00:47.114008 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 09:00:47.114211 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 09:00:47.114444 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 9 09:00:47.114640 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 9 09:00:47.114828 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 09:00:47.115072 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 09:00:47.115280 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 9 09:00:47.115491 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 9 09:00:47.115684 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 09:00:47.115909 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 9 09:00:47.116107 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 9 09:00:47.126369 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 9 09:00:47.126742 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 09:00:47.126961 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 9 09:00:47.127136 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 09:00:47.127347 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 9 09:00:47.127525 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 09:00:47.127709 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 9 09:00:47.127899 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 9 09:00:47.128067 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 9 09:00:47.128246 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 9 09:00:47.128467 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 09:00:47.128637 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 9 09:00:47.128798 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 9 09:00:47.128818 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 09:00:47.128834 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 09:00:47.128849 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 09:00:47.128874 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 09:00:47.128888 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 09:00:47.128902 kernel: iommu: Default domain type: Translated Feb 9 09:00:47.128916 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 09:00:47.129098 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 09:00:47.129269 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 09:00:47.129460 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 09:00:47.129479 kernel: vgaarb: loaded Feb 9 09:00:47.129504 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:00:47.129517 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:00:47.129530 kernel: PTP clock support registered Feb 9 09:00:47.129544 kernel: PCI: Using ACPI for IRQ routing Feb 9 09:00:47.129557 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 09:00:47.129571 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 09:00:47.129586 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 9 09:00:47.129600 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 09:00:47.129614 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 09:00:47.129632 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 09:00:47.129647 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:00:47.129663 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:00:47.129680 kernel: pnp: PnP ACPI init Feb 9 09:00:47.129694 kernel: pnp: PnP ACPI: found 4 devices Feb 9 09:00:47.129708 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 09:00:47.129722 kernel: NET: Registered PF_INET protocol family Feb 9 09:00:47.129736 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:00:47.129751 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 09:00:47.129772 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:00:47.129786 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 09:00:47.129800 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 09:00:47.129814 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 09:00:47.129828 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 09:00:47.129842 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 09:00:47.129858 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:00:47.129872 kernel: NET: Registered PF_XDP protocol family Feb 9 09:00:47.130068 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 09:00:47.130227 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 09:00:47.130390 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 09:00:47.130538 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 09:00:47.130680 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 09:00:47.130862 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 09:00:47.131036 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 09:00:47.131197 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 09:00:47.131229 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 09:00:47.131450 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 32647 usecs Feb 9 09:00:47.131472 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:00:47.131487 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 09:00:47.131503 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Feb 9 09:00:47.131517 kernel: Initialise system trusted keyrings Feb 9 09:00:47.131533 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 09:00:47.131548 kernel: Key type asymmetric registered Feb 9 09:00:47.131562 kernel: Asymmetric key parser 'x509' registered Feb 9 09:00:47.131583 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:00:47.131597 kernel: io scheduler mq-deadline registered Feb 9 09:00:47.131611 kernel: io scheduler kyber registered Feb 9 09:00:47.131625 kernel: io scheduler bfq registered Feb 9 09:00:47.131639 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 09:00:47.131655 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 09:00:47.131670 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 09:00:47.131685 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 09:00:47.131699 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:00:47.131714 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 09:00:47.131735 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 09:00:47.131749 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 09:00:47.131763 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 09:00:47.132001 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 9 09:00:47.132025 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 09:00:47.132175 kernel: rtc_cmos 00:03: registered as rtc0 Feb 9 09:00:47.132351 kernel: rtc_cmos 00:03: setting system clock to 2024-02-09T09:00:46 UTC (1707469246) Feb 9 09:00:47.132514 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 9 09:00:47.132532 kernel: intel_pstate: CPU model not supported Feb 9 09:00:47.132546 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:00:47.132568 kernel: Segment Routing with IPv6 Feb 9 09:00:47.132589 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:00:47.132605 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:00:47.132622 kernel: Key type dns_resolver registered Feb 9 09:00:47.132642 kernel: IPI shorthand broadcast: enabled Feb 9 09:00:47.132656 kernel: sched_clock: Marking stable (763006169, 119548742)->(1003930730, -121375819) Feb 9 09:00:47.132683 kernel: registered taskstats version 1 Feb 9 09:00:47.132705 kernel: Loading compiled-in X.509 certificates Feb 9 09:00:47.132726 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 09:00:47.132743 kernel: Key type .fscrypt registered Feb 9 09:00:47.132759 kernel: Key type fscrypt-provisioning registered Feb 9 09:00:47.132773 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:00:47.132791 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:00:47.132812 kernel: ima: No architecture policies found Feb 9 09:00:47.132833 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 09:00:47.132851 kernel: Write protecting the kernel read-only data: 28672k Feb 9 09:00:47.132873 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 09:00:47.132894 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 09:00:47.132915 kernel: Run /init as init process Feb 9 09:00:47.132936 kernel: with arguments: Feb 9 09:00:47.132960 kernel: /init Feb 9 09:00:47.133008 kernel: with environment: Feb 9 09:00:47.133025 kernel: HOME=/ Feb 9 09:00:47.133039 kernel: TERM=linux Feb 9 09:00:47.133056 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:00:47.133076 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:00:47.133097 systemd[1]: Detected virtualization kvm. Feb 9 09:00:47.133113 systemd[1]: Detected architecture x86-64. Feb 9 09:00:47.133126 systemd[1]: Running in initrd. Feb 9 09:00:47.133140 systemd[1]: No hostname configured, using default hostname. Feb 9 09:00:47.133153 systemd[1]: Hostname set to . Feb 9 09:00:47.133173 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:00:47.133186 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:00:47.133200 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:00:47.133215 systemd[1]: Reached target cryptsetup.target. Feb 9 09:00:47.133229 systemd[1]: Reached target paths.target. Feb 9 09:00:47.133243 systemd[1]: Reached target slices.target. Feb 9 09:00:47.133257 systemd[1]: Reached target swap.target. Feb 9 09:00:47.133271 systemd[1]: Reached target timers.target. Feb 9 09:00:47.133311 systemd[1]: Listening on iscsid.socket. Feb 9 09:00:47.133325 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:00:47.133339 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:00:47.133354 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:00:47.133371 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:00:47.133386 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:00:47.133400 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:00:47.133416 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:00:47.133436 systemd[1]: Reached target sockets.target. Feb 9 09:00:47.133450 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:00:47.133465 systemd[1]: Finished network-cleanup.service. Feb 9 09:00:47.133487 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:00:47.133505 systemd[1]: Starting systemd-journald.service... Feb 9 09:00:47.133522 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:00:47.133541 systemd[1]: Starting systemd-resolved.service... Feb 9 09:00:47.133556 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:00:47.133572 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:00:47.133588 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:00:47.133603 kernel: audit: type=1130 audit(1707469247.083:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.133618 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:00:47.133644 systemd-journald[183]: Journal started Feb 9 09:00:47.133769 systemd-journald[183]: Runtime Journal (/run/log/journal/3df6ecb5a9a742cda5c64fdd0eecffd4) is 4.9M, max 39.5M, 34.5M free. Feb 9 09:00:47.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.089458 systemd-modules-load[184]: Inserted module 'overlay' Feb 9 09:00:47.173388 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:00:47.173424 kernel: Bridge firewalling registered Feb 9 09:00:47.150384 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 9 09:00:47.162555 systemd-resolved[185]: Positive Trust Anchors: Feb 9 09:00:47.162576 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:00:47.176792 systemd[1]: Started systemd-journald.service. Feb 9 09:00:47.162631 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:00:47.183490 kernel: audit: type=1130 audit(1707469247.176:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.183540 kernel: SCSI subsystem initialized Feb 9 09:00:47.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.167109 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 9 09:00:47.177522 systemd[1]: Started systemd-resolved.service. Feb 9 09:00:47.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.189714 kernel: audit: type=1130 audit(1707469247.185:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.189248 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:00:47.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.193547 kernel: audit: type=1130 audit(1707469247.190:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.193789 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:00:47.198189 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:00:47.198231 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:00:47.198243 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:00:47.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.202069 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 9 09:00:47.202584 kernel: audit: type=1130 audit(1707469247.198:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.202779 systemd[1]: Reached target nss-lookup.target. Feb 9 09:00:47.204948 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:00:47.206326 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:00:47.208520 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:00:47.209930 kernel: audit: type=1130 audit(1707469247.206:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.225714 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:00:47.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.230335 kernel: audit: type=1130 audit(1707469247.226:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.232383 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:00:47.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.243647 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:00:47.244346 kernel: audit: type=1130 audit(1707469247.240:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.259181 dracut-cmdline[205]: dracut-dracut-053 Feb 9 09:00:47.262553 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:00:47.356330 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:00:47.370328 kernel: iscsi: registered transport (tcp) Feb 9 09:00:47.394515 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:00:47.394626 kernel: QLogic iSCSI HBA Driver Feb 9 09:00:47.448900 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:00:47.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.452427 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:00:47.455750 kernel: audit: type=1130 audit(1707469247.449:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.520402 kernel: raid6: avx2x4 gen() 16003 MB/s Feb 9 09:00:47.537380 kernel: raid6: avx2x4 xor() 7469 MB/s Feb 9 09:00:47.554375 kernel: raid6: avx2x2 gen() 16217 MB/s Feb 9 09:00:47.571377 kernel: raid6: avx2x2 xor() 18337 MB/s Feb 9 09:00:47.588373 kernel: raid6: avx2x1 gen() 12467 MB/s Feb 9 09:00:47.605371 kernel: raid6: avx2x1 xor() 16696 MB/s Feb 9 09:00:47.622374 kernel: raid6: sse2x4 gen() 11770 MB/s Feb 9 09:00:47.639376 kernel: raid6: sse2x4 xor() 6985 MB/s Feb 9 09:00:47.656365 kernel: raid6: sse2x2 gen() 11723 MB/s Feb 9 09:00:47.673381 kernel: raid6: sse2x2 xor() 7013 MB/s Feb 9 09:00:47.690381 kernel: raid6: sse2x1 gen() 9612 MB/s Feb 9 09:00:47.708042 kernel: raid6: sse2x1 xor() 5414 MB/s Feb 9 09:00:47.708154 kernel: raid6: using algorithm avx2x2 gen() 16217 MB/s Feb 9 09:00:47.708171 kernel: raid6: .... xor() 18337 MB/s, rmw enabled Feb 9 09:00:47.708714 kernel: raid6: using avx2x2 recovery algorithm Feb 9 09:00:47.725330 kernel: xor: automatically using best checksumming function avx Feb 9 09:00:47.850369 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 09:00:47.866413 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:00:47.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.867000 audit: BPF prog-id=7 op=LOAD Feb 9 09:00:47.867000 audit: BPF prog-id=8 op=LOAD Feb 9 09:00:47.868454 systemd[1]: Starting systemd-udevd.service... Feb 9 09:00:47.888252 systemd-udevd[383]: Using default interface naming scheme 'v252'. Feb 9 09:00:47.895143 systemd[1]: Started systemd-udevd.service. Feb 9 09:00:47.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.899759 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:00:47.917682 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Feb 9 09:00:47.965675 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:00:47.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:47.967608 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:00:48.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:48.039649 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:00:48.101320 kernel: ACPI: bus type USB registered Feb 9 09:00:48.103320 kernel: usbcore: registered new interface driver usbfs Feb 9 09:00:48.103407 kernel: usbcore: registered new interface driver hub Feb 9 09:00:48.104312 kernel: usbcore: registered new device driver usb Feb 9 09:00:48.122322 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 9 09:00:48.128328 kernel: ehci-pci: EHCI PCI platform driver Feb 9 09:00:48.135366 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 9 09:00:48.140672 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 09:00:48.140755 kernel: GPT:9289727 != 125829119 Feb 9 09:00:48.140774 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 09:00:48.141504 kernel: GPT:9289727 != 125829119 Feb 9 09:00:48.142769 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 09:00:48.142814 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 09:00:48.160578 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:00:48.161321 kernel: libata version 3.00 loaded. Feb 9 09:00:48.166334 kernel: scsi host0: Virtio SCSI HBA Feb 9 09:00:48.177426 kernel: virtio_blk virtio5: [vdb] 948 512-byte logical blocks (485 kB/474 KiB) Feb 9 09:00:48.191328 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 9 09:00:48.191443 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 09:00:48.193490 kernel: AES CTR mode by8 optimization enabled Feb 9 09:00:48.196370 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 09:00:48.227686 kernel: scsi host1: ata_piix Feb 9 09:00:48.228228 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (436) Feb 9 09:00:48.237708 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:00:48.320439 kernel: scsi host2: ata_piix Feb 9 09:00:48.320751 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 9 09:00:48.320767 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 9 09:00:48.320779 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 9 09:00:48.320900 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 9 09:00:48.320997 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 9 09:00:48.321120 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 9 09:00:48.321215 kernel: hub 1-0:1.0: USB hub found Feb 9 09:00:48.321393 kernel: hub 1-0:1.0: 2 ports detected Feb 9 09:00:48.336026 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:00:48.336832 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:00:48.342561 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:00:48.350458 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:00:48.352499 systemd[1]: Starting disk-uuid.service... Feb 9 09:00:48.370356 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 09:00:48.375038 disk-uuid[503]: Primary Header is updated. Feb 9 09:00:48.375038 disk-uuid[503]: Secondary Entries is updated. Feb 9 09:00:48.375038 disk-uuid[503]: Secondary Header is updated. Feb 9 09:00:49.396112 disk-uuid[504]: The operation has completed successfully. Feb 9 09:00:49.397032 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 09:00:49.465118 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:00:49.466371 systemd[1]: Finished disk-uuid.service. Feb 9 09:00:49.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.469428 systemd[1]: Starting verity-setup.service... Feb 9 09:00:49.495343 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 09:00:49.572212 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:00:49.575697 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:00:49.579473 systemd[1]: Finished verity-setup.service. Feb 9 09:00:49.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.709369 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:00:49.710263 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:00:49.711269 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:00:49.712821 systemd[1]: Starting ignition-setup.service... Feb 9 09:00:49.715338 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:00:49.735137 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:00:49.735241 kernel: BTRFS info (device vda6): using free space tree Feb 9 09:00:49.735260 kernel: BTRFS info (device vda6): has skinny extents Feb 9 09:00:49.762462 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:00:49.774311 systemd[1]: Finished ignition-setup.service. Feb 9 09:00:49.776740 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:00:49.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.953814 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:00:49.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.955000 audit: BPF prog-id=9 op=LOAD Feb 9 09:00:49.957056 systemd[1]: Starting systemd-networkd.service... Feb 9 09:00:49.990911 systemd-networkd[688]: lo: Link UP Feb 9 09:00:49.990929 systemd-networkd[688]: lo: Gained carrier Feb 9 09:00:49.992749 systemd-networkd[688]: Enumeration completed Feb 9 09:00:49.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:49.993768 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:00:49.993921 systemd[1]: Started systemd-networkd.service. Feb 9 09:00:49.994767 systemd[1]: Reached target network.target. Feb 9 09:00:49.996198 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 9 09:00:49.998719 systemd-networkd[688]: eth1: Link UP Feb 9 09:00:49.998725 systemd-networkd[688]: eth1: Gained carrier Feb 9 09:00:50.000995 systemd[1]: Starting iscsiuio.service... Feb 9 09:00:50.007426 systemd-networkd[688]: eth0: Link UP Feb 9 09:00:50.008131 systemd-networkd[688]: eth0: Gained carrier Feb 9 09:00:50.022625 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.4/20 acquired from 169.254.169.253 Feb 9 09:00:50.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.026214 systemd[1]: Started iscsiuio.service. Feb 9 09:00:50.029487 systemd[1]: Starting iscsid.service... Feb 9 09:00:50.035113 iscsid[693]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:00:50.035113 iscsid[693]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:00:50.035113 iscsid[693]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:00:50.035113 iscsid[693]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:00:50.035113 iscsid[693]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:00:50.035113 iscsid[693]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:00:50.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.051558 ignition[601]: Ignition 2.14.0 Feb 9 09:00:50.038838 systemd[1]: Started iscsid.service. Feb 9 09:00:50.051574 ignition[601]: Stage: fetch-offline Feb 9 09:00:50.044651 systemd-networkd[688]: eth0: DHCPv4 address 64.227.99.217/20, gateway 64.227.96.1 acquired from 169.254.169.253 Feb 9 09:00:50.051698 ignition[601]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.050697 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:00:50.051745 ignition[601]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.063737 ignition[601]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.064118 ignition[601]: parsed url from cmdline: "" Feb 9 09:00:50.065960 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:00:50.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.064127 ignition[601]: no config URL provided Feb 9 09:00:50.064138 ignition[601]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:00:50.064156 ignition[601]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:00:50.068661 systemd[1]: Starting ignition-fetch.service... Feb 9 09:00:50.064164 ignition[601]: failed to fetch config: resource requires networking Feb 9 09:00:50.064406 ignition[601]: Ignition finished successfully Feb 9 09:00:50.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.081914 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:00:50.082513 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:00:50.082913 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:00:50.083273 systemd[1]: Reached target remote-fs.target. Feb 9 09:00:50.087715 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:00:50.090815 ignition[695]: Ignition 2.14.0 Feb 9 09:00:50.090832 ignition[695]: Stage: fetch Feb 9 09:00:50.090976 ignition[695]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.091001 ignition[695]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.096424 ignition[695]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.097554 ignition[695]: parsed url from cmdline: "" Feb 9 09:00:50.097683 ignition[695]: no config URL provided Feb 9 09:00:50.098274 ignition[695]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:00:50.099066 ignition[695]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:00:50.099754 ignition[695]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 9 09:00:50.106574 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:00:50.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.121817 ignition[695]: GET result: OK Feb 9 09:00:50.122365 ignition[695]: parsing config with SHA512: 75131716859a885ff14cdb07337639857ea01a3be89e8a61ebc0ae7c166c8b2740eba3d8d9b80ade123f1dab3d2cb9b0cd3330d1bbd6f550a99dbb5c9401d9d1 Feb 9 09:00:50.151462 unknown[695]: fetched base config from "system" Feb 9 09:00:50.152024 ignition[695]: fetch: fetch complete Feb 9 09:00:50.151483 unknown[695]: fetched base config from "system" Feb 9 09:00:50.152035 ignition[695]: fetch: fetch passed Feb 9 09:00:50.151490 unknown[695]: fetched user config from "digitalocean" Feb 9 09:00:50.152125 ignition[695]: Ignition finished successfully Feb 9 09:00:50.153647 systemd[1]: Finished ignition-fetch.service. Feb 9 09:00:50.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.156231 systemd[1]: Starting ignition-kargs.service... Feb 9 09:00:50.170695 ignition[714]: Ignition 2.14.0 Feb 9 09:00:50.171553 ignition[714]: Stage: kargs Feb 9 09:00:50.172323 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.172994 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.175624 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.178763 ignition[714]: kargs: kargs passed Feb 9 09:00:50.179419 ignition[714]: Ignition finished successfully Feb 9 09:00:50.181685 systemd[1]: Finished ignition-kargs.service. Feb 9 09:00:50.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.183594 systemd[1]: Starting ignition-disks.service... Feb 9 09:00:50.203420 ignition[720]: Ignition 2.14.0 Feb 9 09:00:50.203444 ignition[720]: Stage: disks Feb 9 09:00:50.203663 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.203692 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.206987 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.209936 ignition[720]: disks: disks passed Feb 9 09:00:50.210041 ignition[720]: Ignition finished successfully Feb 9 09:00:50.212447 systemd[1]: Finished ignition-disks.service. Feb 9 09:00:50.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.213672 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:00:50.214708 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:00:50.215646 systemd[1]: Reached target local-fs.target. Feb 9 09:00:50.216617 systemd[1]: Reached target sysinit.target. Feb 9 09:00:50.217654 systemd[1]: Reached target basic.target. Feb 9 09:00:50.220604 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:00:50.244966 systemd-fsck[728]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 09:00:50.250592 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:00:50.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.253988 systemd[1]: Mounting sysroot.mount... Feb 9 09:00:50.270327 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:00:50.272147 systemd[1]: Mounted sysroot.mount. Feb 9 09:00:50.273802 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:00:50.277788 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:00:50.279634 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 9 09:00:50.282269 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:00:50.282962 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:00:50.283019 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:00:50.293438 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:00:50.296619 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:00:50.310103 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:00:50.340165 initrd-setup-root[748]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:00:50.349682 initrd-setup-root[758]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:00:50.364407 initrd-setup-root[766]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:00:50.500191 coreos-metadata[734]: Feb 09 09:00:50.499 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:00:50.508641 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:00:50.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.514858 systemd[1]: Starting ignition-mount.service... Feb 9 09:00:50.520283 coreos-metadata[734]: Feb 09 09:00:50.517 INFO Fetch successful Feb 9 09:00:50.521848 systemd[1]: Starting sysroot-boot.service... Feb 9 09:00:50.534605 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 9 09:00:50.536377 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 9 09:00:50.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.546569 bash[785]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 09:00:50.547564 coreos-metadata[735]: Feb 09 09:00:50.547 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:00:50.567254 ignition[787]: INFO : Ignition 2.14.0 Feb 9 09:00:50.568605 coreos-metadata[735]: Feb 09 09:00:50.568 INFO Fetch successful Feb 9 09:00:50.569402 ignition[787]: INFO : Stage: mount Feb 9 09:00:50.570463 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.571265 ignition[787]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.575309 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.576736 coreos-metadata[735]: Feb 09 09:00:50.576 INFO wrote hostname ci-3510.3.2-5-babd43ad13 to /sysroot/etc/hostname Feb 9 09:00:50.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.578633 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:00:50.581369 ignition[787]: INFO : mount: mount passed Feb 9 09:00:50.582053 ignition[787]: INFO : Ignition finished successfully Feb 9 09:00:50.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.584221 systemd[1]: Finished sysroot-boot.service. Feb 9 09:00:50.585655 systemd[1]: Finished ignition-mount.service. Feb 9 09:00:50.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:50.620375 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:00:50.633336 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (795) Feb 9 09:00:50.637204 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:00:50.637315 kernel: BTRFS info (device vda6): using free space tree Feb 9 09:00:50.637335 kernel: BTRFS info (device vda6): has skinny extents Feb 9 09:00:50.644983 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:00:50.652473 systemd[1]: Starting ignition-files.service... Feb 9 09:00:50.684038 ignition[815]: INFO : Ignition 2.14.0 Feb 9 09:00:50.684038 ignition[815]: INFO : Stage: files Feb 9 09:00:50.695429 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:50.695429 ignition[815]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:50.695429 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:50.699620 ignition[815]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:00:50.699620 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:00:50.699620 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:00:50.703840 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:00:50.705850 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:00:50.707170 unknown[815]: wrote ssh authorized keys file for user: core Feb 9 09:00:50.709747 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:00:50.709747 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 09:00:50.709747 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 09:00:51.128571 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:00:51.490084 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 09:00:51.490084 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 09:00:51.492579 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 09:00:51.492579 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 09:00:51.613594 systemd-networkd[688]: eth0: Gained IPv6LL Feb 9 09:00:51.677824 systemd-networkd[688]: eth1: Gained IPv6LL Feb 9 09:00:51.804522 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:00:51.992106 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 09:00:51.993764 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 09:00:51.995471 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:00:51.996708 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 09:00:52.070618 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:00:52.402249 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 09:00:52.402249 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:00:52.404758 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:00:52.404758 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 09:00:52.483069 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:00:53.365198 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 09:00:53.365198 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:00:53.392693 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(b): [started] processing unit "prepare-critools.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(b): op(c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(b): op(c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(b): [finished] processing unit "prepare-critools.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(d): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(d): op(e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(d): op(e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(d): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:00:53.392693 ignition[815]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:00:53.573331 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 09:00:53.573386 kernel: audit: type=1130 audit(1707469253.405:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.573407 kernel: audit: type=1130 audit(1707469253.557:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.573601 ignition[815]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:00:53.573601 ignition[815]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:00:53.573601 ignition[815]: INFO : files: op(11): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:00:53.573601 ignition[815]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:00:53.573601 ignition[815]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:00:53.573601 ignition[815]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:00:53.573601 ignition[815]: INFO : files: files passed Feb 9 09:00:53.573601 ignition[815]: INFO : Ignition finished successfully Feb 9 09:00:53.584862 kernel: audit: type=1130 audit(1707469253.573:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.584911 kernel: audit: type=1131 audit(1707469253.573:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.403909 systemd[1]: Finished ignition-files.service. Feb 9 09:00:53.411585 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:00:53.586693 initrd-setup-root-after-ignition[839]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:00:53.465690 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:00:53.467203 systemd[1]: Starting ignition-quench.service... Feb 9 09:00:53.477170 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:00:53.558891 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:00:53.559070 systemd[1]: Finished ignition-quench.service. Feb 9 09:00:53.574032 systemd[1]: Reached target ignition-complete.target. Feb 9 09:00:53.582031 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:00:53.604629 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:00:53.604848 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:00:53.612940 kernel: audit: type=1130 audit(1707469253.605:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.613005 kernel: audit: type=1131 audit(1707469253.605:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.606043 systemd[1]: Reached target initrd-fs.target. Feb 9 09:00:53.613274 systemd[1]: Reached target initrd.target. Feb 9 09:00:53.621932 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:00:53.623543 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:00:53.639308 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:00:53.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.641579 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:00:53.645438 kernel: audit: type=1130 audit(1707469253.639:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.655836 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:00:53.657034 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:00:53.657993 systemd[1]: Stopped target timers.target. Feb 9 09:00:53.658835 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:00:53.659471 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:00:53.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.661606 systemd[1]: Stopped target initrd.target. Feb 9 09:00:53.664705 kernel: audit: type=1131 audit(1707469253.660:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.664318 systemd[1]: Stopped target basic.target. Feb 9 09:00:53.665108 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:00:53.665926 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:00:53.666679 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:00:53.667490 systemd[1]: Stopped target remote-fs.target. Feb 9 09:00:53.668502 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:00:53.669235 systemd[1]: Stopped target sysinit.target. Feb 9 09:00:53.669969 systemd[1]: Stopped target local-fs.target. Feb 9 09:00:53.670578 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:00:53.671227 systemd[1]: Stopped target swap.target. Feb 9 09:00:53.671853 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:00:53.672220 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:00:53.675778 kernel: audit: type=1131 audit(1707469253.672:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.673156 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:00:53.676553 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:00:53.676824 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:00:53.681092 kernel: audit: type=1131 audit(1707469253.677:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.678058 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:00:53.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.678236 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:00:53.681880 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:00:53.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.682122 systemd[1]: Stopped ignition-files.service. Feb 9 09:00:53.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.683265 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:00:53.683460 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:00:53.685361 systemd[1]: Stopping ignition-mount.service... Feb 9 09:00:53.686021 systemd[1]: Stopping iscsiuio.service... Feb 9 09:00:53.695357 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:00:53.696449 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:00:53.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.699383 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:00:53.700491 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:00:53.701581 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:00:53.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.703009 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:00:53.703879 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:00:53.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.707673 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:00:53.708516 systemd[1]: Stopped iscsiuio.service. Feb 9 09:00:53.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.711079 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:00:53.711184 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:00:53.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.716836 ignition[853]: INFO : Ignition 2.14.0 Feb 9 09:00:53.716836 ignition[853]: INFO : Stage: umount Feb 9 09:00:53.718068 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:00:53.718068 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:00:53.719313 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:00:53.722311 ignition[853]: INFO : umount: umount passed Feb 9 09:00:53.722311 ignition[853]: INFO : Ignition finished successfully Feb 9 09:00:53.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.722685 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:00:53.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.722796 systemd[1]: Stopped ignition-mount.service. Feb 9 09:00:53.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.724016 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:00:53.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.724105 systemd[1]: Stopped ignition-disks.service. Feb 9 09:00:53.725754 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:00:53.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.725852 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:00:53.726524 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:00:53.726597 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:00:53.728130 systemd[1]: Stopped target network.target. Feb 9 09:00:53.728861 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:00:53.728951 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:00:53.729993 systemd[1]: Stopped target paths.target. Feb 9 09:00:53.731612 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:00:53.735440 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:00:53.736054 systemd[1]: Stopped target slices.target. Feb 9 09:00:53.736433 systemd[1]: Stopped target sockets.target. Feb 9 09:00:53.739504 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:00:53.739559 systemd[1]: Closed iscsid.socket. Feb 9 09:00:53.741090 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:00:53.741168 systemd[1]: Closed iscsiuio.socket. Feb 9 09:00:53.741794 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:00:53.741862 systemd[1]: Stopped ignition-setup.service. Feb 9 09:00:53.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.746118 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:00:53.746694 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:00:53.748680 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:00:53.749349 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:00:53.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.749389 systemd-networkd[688]: eth0: DHCPv6 lease lost Feb 9 09:00:53.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.749475 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:00:53.750044 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:00:53.750099 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:00:53.753668 systemd-networkd[688]: eth1: DHCPv6 lease lost Feb 9 09:00:53.759748 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:00:53.759908 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:00:53.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.761950 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:00:53.762141 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:00:53.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.763000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:00:53.764189 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:00:53.764000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:00:53.764257 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:00:53.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.766446 systemd[1]: Stopping network-cleanup.service... Feb 9 09:00:53.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.766909 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:00:53.767007 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:00:53.767753 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:00:53.767824 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:00:53.768620 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:00:53.768685 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:00:53.769372 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:00:53.777218 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:00:53.789576 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:00:53.789826 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:00:53.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.791384 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:00:53.791515 systemd[1]: Stopped network-cleanup.service. Feb 9 09:00:53.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.793058 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:00:53.793106 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:00:53.793633 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:00:53.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.793692 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:00:53.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.794560 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:00:53.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.794620 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:00:53.795412 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:00:53.795462 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:00:53.796603 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:00:53.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.796671 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:00:53.798623 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:00:53.799465 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:00:53.799559 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:00:53.810477 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:00:53.810613 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:00:53.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:53.812247 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:00:53.814231 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:00:53.829524 systemd[1]: Switching root. Feb 9 09:00:53.852998 iscsid[693]: iscsid shutting down. Feb 9 09:00:53.853748 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Feb 9 09:00:53.853833 systemd-journald[183]: Journal stopped Feb 9 09:00:57.534777 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:00:57.534889 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:00:57.534912 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:00:57.534945 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:00:57.534963 kernel: SELinux: policy capability open_perms=1 Feb 9 09:00:57.534981 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:00:57.535000 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:00:57.535016 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:00:57.535034 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:00:57.535049 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:00:57.535072 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:00:57.535105 systemd[1]: Successfully loaded SELinux policy in 45.433ms. Feb 9 09:00:57.535140 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.321ms. Feb 9 09:00:57.535166 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:00:57.535183 systemd[1]: Detected virtualization kvm. Feb 9 09:00:57.535203 systemd[1]: Detected architecture x86-64. Feb 9 09:00:57.535222 systemd[1]: Detected first boot. Feb 9 09:00:57.546656 systemd[1]: Hostname set to . Feb 9 09:00:57.546742 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:00:57.546767 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:00:57.547391 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:00:57.547431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:00:57.547465 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:00:57.547489 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:00:57.549327 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:00:57.549383 systemd[1]: Stopped iscsid.service. Feb 9 09:00:57.549430 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:00:57.549451 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:00:57.549472 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:00:57.549491 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:00:57.549511 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:00:57.549529 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 09:00:57.549548 systemd[1]: Created slice system-getty.slice. Feb 9 09:00:57.549566 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:00:57.549587 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:00:57.549624 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:00:57.549641 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:00:57.549657 systemd[1]: Created slice user.slice. Feb 9 09:00:57.549673 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:00:57.549689 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:00:57.549707 systemd[1]: Set up automount boot.automount. Feb 9 09:00:57.549734 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:00:57.549751 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:00:57.549768 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:00:57.549788 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:00:57.549808 systemd[1]: Reached target integritysetup.target. Feb 9 09:00:57.549826 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:00:57.549843 systemd[1]: Reached target remote-fs.target. Feb 9 09:00:57.549860 systemd[1]: Reached target slices.target. Feb 9 09:00:57.549876 systemd[1]: Reached target swap.target. Feb 9 09:00:57.549893 systemd[1]: Reached target torcx.target. Feb 9 09:00:57.549948 systemd[1]: Reached target veritysetup.target. Feb 9 09:00:57.549967 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:00:57.549985 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:00:57.550003 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:00:57.550020 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:00:57.550039 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:00:57.550056 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:00:57.550073 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:00:57.550092 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:00:57.550121 systemd[1]: Mounting media.mount... Feb 9 09:00:57.550142 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:00:57.550163 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:00:57.550180 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:00:57.550195 systemd[1]: Mounting tmp.mount... Feb 9 09:00:57.550211 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:00:57.550229 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:00:57.550245 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:00:57.550264 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:00:57.550545 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:00:57.550582 systemd[1]: Starting modprobe@drm.service... Feb 9 09:00:57.550601 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:00:57.550621 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:00:57.550638 systemd[1]: Starting modprobe@loop.service... Feb 9 09:00:57.550656 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:00:57.550674 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:00:57.550708 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:00:57.550725 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:00:57.550758 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:00:57.550776 systemd[1]: Stopped systemd-journald.service. Feb 9 09:00:57.550793 systemd[1]: Starting systemd-journald.service... Feb 9 09:00:57.550813 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:00:57.550832 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:00:57.550848 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:00:57.550866 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:00:57.550882 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:00:57.550898 systemd[1]: Stopped verity-setup.service. Feb 9 09:00:57.550929 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:00:57.550958 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:00:57.550981 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:00:57.551001 systemd[1]: Mounted media.mount. Feb 9 09:00:57.551023 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:00:57.551044 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:00:57.551064 systemd[1]: Mounted tmp.mount. Feb 9 09:00:57.551085 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:00:57.551105 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:00:57.551137 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:00:57.551168 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:00:57.551189 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:00:57.551211 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:00:57.551232 systemd[1]: Finished modprobe@drm.service. Feb 9 09:00:57.551262 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:00:57.551284 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:00:57.551321 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:00:57.551345 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:00:57.551369 kernel: loop: module loaded Feb 9 09:00:57.551397 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:00:57.551422 systemd[1]: Reached target network-pre.target. Feb 9 09:00:57.551446 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:00:57.551474 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:00:57.551522 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:00:57.551553 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:00:57.551579 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:00:57.551605 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:00:57.551648 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:00:57.551691 systemd[1]: Finished modprobe@loop.service. Feb 9 09:00:57.551738 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:00:57.551764 kernel: fuse: init (API version 7.34) Feb 9 09:00:57.551803 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:00:57.551842 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:00:57.552057 systemd-journald[959]: Journal started Feb 9 09:00:57.552188 systemd-journald[959]: Runtime Journal (/run/log/journal/3df6ecb5a9a742cda5c64fdd0eecffd4) is 4.9M, max 39.5M, 34.5M free. Feb 9 09:00:54.006000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:00:54.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:00:54.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:00:54.068000 audit: BPF prog-id=10 op=LOAD Feb 9 09:00:54.068000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:00:54.068000 audit: BPF prog-id=11 op=LOAD Feb 9 09:00:54.068000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:00:54.178000 audit[886]: AVC avc: denied { associate } for pid=886 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:00:54.178000 audit[886]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=869 pid=886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:00:54.178000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:00:54.180000 audit[886]: AVC avc: denied { associate } for pid=886 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:00:54.180000 audit[886]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=869 pid=886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:00:54.180000 audit: CWD cwd="/" Feb 9 09:00:54.180000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:54.180000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:54.180000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:00:57.256000 audit: BPF prog-id=12 op=LOAD Feb 9 09:00:57.565095 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:00:57.565193 systemd[1]: Started systemd-journald.service. Feb 9 09:00:57.256000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:00:57.256000 audit: BPF prog-id=13 op=LOAD Feb 9 09:00:57.256000 audit: BPF prog-id=14 op=LOAD Feb 9 09:00:57.256000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:00:57.256000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:00:57.258000 audit: BPF prog-id=15 op=LOAD Feb 9 09:00:57.258000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:00:57.258000 audit: BPF prog-id=16 op=LOAD Feb 9 09:00:57.258000 audit: BPF prog-id=17 op=LOAD Feb 9 09:00:57.258000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:00:57.258000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:00:57.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.266000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:00:57.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.423000 audit: BPF prog-id=18 op=LOAD Feb 9 09:00:57.424000 audit: BPF prog-id=19 op=LOAD Feb 9 09:00:57.424000 audit: BPF prog-id=20 op=LOAD Feb 9 09:00:57.424000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:00:57.424000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:00:57.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.517000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:00:57.517000 audit[959]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffda8bdc7a0 a2=4000 a3=7ffda8bdc83c items=0 ppid=1 pid=959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:00:57.517000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:00:57.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.253436 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:00:54.175747 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:00:57.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.253464 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 09:00:54.176660 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:00:57.259856 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:00:54.176684 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:00:57.592199 systemd-journald[959]: Time spent on flushing to /var/log/journal/3df6ecb5a9a742cda5c64fdd0eecffd4 is 21.425ms for 1133 entries. Feb 9 09:00:57.592199 systemd-journald[959]: System Journal (/var/log/journal/3df6ecb5a9a742cda5c64fdd0eecffd4) is 8.0M, max 195.6M, 187.6M free. Feb 9 09:00:57.629799 systemd-journald[959]: Received client request to flush runtime journal. Feb 9 09:00:57.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.559615 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:00:54.176741 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:00:57.577471 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:00:54.176752 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:00:57.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.579799 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:00:54.176798 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:00:57.580641 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:00:54.176813 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:00:57.581134 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:00:54.177056 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:00:57.600453 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:00:54.177110 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:00:57.630988 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:00:54.177126 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:00:54.177854 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:00:54.177893 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:00:54.177915 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:00:54.177930 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:00:54.177951 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:00:54.177964 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:00:56.724967 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:00:56.725370 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:00:56.725551 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:00:56.725844 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:00:56.725929 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:00:56.726035 /usr/lib/systemd/system-generators/torcx-generator[886]: time="2024-02-09T09:00:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:00:57.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.657078 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:00:57.659693 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:00:57.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.704636 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:00:57.707772 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:00:57.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:57.710248 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:00:57.725702 udevadm[995]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 09:00:58.373340 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:00:58.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.374000 audit: BPF prog-id=21 op=LOAD Feb 9 09:00:58.374000 audit: BPF prog-id=22 op=LOAD Feb 9 09:00:58.374000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:00:58.374000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:00:58.375548 systemd[1]: Starting systemd-udevd.service... Feb 9 09:00:58.399985 systemd-udevd[996]: Using default interface naming scheme 'v252'. Feb 9 09:00:58.445356 kernel: kauditd_printk_skb: 106 callbacks suppressed Feb 9 09:00:58.445509 kernel: audit: type=1130 audit(1707469258.441:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.445543 kernel: audit: type=1334 audit(1707469258.445:147): prog-id=23 op=LOAD Feb 9 09:00:58.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.445000 audit: BPF prog-id=23 op=LOAD Feb 9 09:00:58.441219 systemd[1]: Started systemd-udevd.service. Feb 9 09:00:58.447041 systemd[1]: Starting systemd-networkd.service... Feb 9 09:00:58.461346 kernel: audit: type=1334 audit(1707469258.456:148): prog-id=24 op=LOAD Feb 9 09:00:58.461458 kernel: audit: type=1334 audit(1707469258.457:149): prog-id=25 op=LOAD Feb 9 09:00:58.461485 kernel: audit: type=1334 audit(1707469258.459:150): prog-id=26 op=LOAD Feb 9 09:00:58.456000 audit: BPF prog-id=24 op=LOAD Feb 9 09:00:58.457000 audit: BPF prog-id=25 op=LOAD Feb 9 09:00:58.459000 audit: BPF prog-id=26 op=LOAD Feb 9 09:00:58.460674 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:00:58.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.511473 systemd[1]: Started systemd-userdbd.service. Feb 9 09:00:58.516405 kernel: audit: type=1130 audit(1707469258.511:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.523692 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 09:00:58.541136 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:00:58.541378 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:00:58.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.543000 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:00:58.545516 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:00:58.550128 systemd[1]: Starting modprobe@loop.service... Feb 9 09:00:58.550772 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:00:58.550856 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:00:58.550965 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:00:58.551529 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:00:58.551711 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:00:58.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.557087 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:00:58.557235 systemd[1]: Finished modprobe@loop.service. Feb 9 09:00:58.560535 kernel: audit: type=1130 audit(1707469258.551:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.560659 kernel: audit: type=1131 audit(1707469258.551:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.560697 kernel: audit: type=1130 audit(1707469258.559:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.560068 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:00:58.564192 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:00:58.564368 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:00:58.565074 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:00:58.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.570478 kernel: audit: type=1131 audit(1707469258.559:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.655273 systemd-networkd[999]: lo: Link UP Feb 9 09:00:58.655783 systemd-networkd[999]: lo: Gained carrier Feb 9 09:00:58.656708 systemd-networkd[999]: Enumeration completed Feb 9 09:00:58.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.657028 systemd[1]: Started systemd-networkd.service. Feb 9 09:00:58.658213 systemd-networkd[999]: eth1: Configuring with /run/systemd/network/10-36:26:e1:9e:d2:51.network. Feb 9 09:00:58.660684 systemd-networkd[999]: eth0: Configuring with /run/systemd/network/10-e2:28:5a:6a:fc:66.network. Feb 9 09:00:58.661900 systemd-networkd[999]: eth1: Link UP Feb 9 09:00:58.662085 systemd-networkd[999]: eth1: Gained carrier Feb 9 09:00:58.665865 systemd-networkd[999]: eth0: Link UP Feb 9 09:00:58.665882 systemd-networkd[999]: eth0: Gained carrier Feb 9 09:00:58.697662 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:00:58.704357 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 09:00:58.713328 kernel: ACPI: button: Power Button [PWRF] Feb 9 09:00:58.734000 audit[998]: AVC avc: denied { confidentiality } for pid=998 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:00:58.734000 audit[998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a4b0822e80 a1=32194 a2=7fce109a7bc5 a3=5 items=108 ppid=996 pid=998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:00:58.734000 audit: CWD cwd="/" Feb 9 09:00:58.734000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=1 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=2 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=3 name=(null) inode=13980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=4 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=5 name=(null) inode=13981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=6 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=7 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=8 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=9 name=(null) inode=13983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=10 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=11 name=(null) inode=13984 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=12 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=13 name=(null) inode=13985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=14 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=15 name=(null) inode=13986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=16 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=17 name=(null) inode=13987 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=18 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=19 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=20 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=21 name=(null) inode=13989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=22 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=23 name=(null) inode=13990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=24 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=25 name=(null) inode=13991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=26 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=27 name=(null) inode=13992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=28 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=29 name=(null) inode=13993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=30 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=31 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=32 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=33 name=(null) inode=13995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=34 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=35 name=(null) inode=13996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=36 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=37 name=(null) inode=13997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=38 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=39 name=(null) inode=13998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=40 name=(null) inode=13994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=41 name=(null) inode=13999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=42 name=(null) inode=13979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=43 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=44 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=45 name=(null) inode=14001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=46 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=47 name=(null) inode=14002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=48 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=49 name=(null) inode=14003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=50 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=51 name=(null) inode=14004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=52 name=(null) inode=14000 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=53 name=(null) inode=14005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=55 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=56 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=57 name=(null) inode=14007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=58 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=59 name=(null) inode=14008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=60 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=61 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=62 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=63 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=64 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=65 name=(null) inode=14011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=66 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=67 name=(null) inode=14012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=68 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=69 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=70 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=71 name=(null) inode=14014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=72 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=73 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=74 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=75 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=76 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=77 name=(null) inode=14017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=78 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=79 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=80 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=81 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=82 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=83 name=(null) inode=14020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=84 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=85 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=86 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=87 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=88 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=89 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=90 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=91 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=92 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=93 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=94 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=95 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=96 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=97 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=98 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=99 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=100 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=101 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=102 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=103 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=104 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=105 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=106 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PATH item=107 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:00:58.734000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:00:58.772380 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 09:00:58.800332 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 09:00:58.819332 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:00:58.952346 kernel: EDAC MC: Ver: 3.0.0 Feb 9 09:00:58.969582 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:00:58.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:58.972844 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:00:59.000833 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:00:59.035256 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:00:59.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.036173 systemd[1]: Reached target cryptsetup.target. Feb 9 09:00:59.038498 systemd[1]: Starting lvm2-activation.service... Feb 9 09:00:59.045123 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:00:59.069519 systemd[1]: Finished lvm2-activation.service. Feb 9 09:00:59.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.070374 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:00:59.073577 systemd[1]: Mounting media-configdrive.mount... Feb 9 09:00:59.074202 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:00:59.074268 systemd[1]: Reached target machines.target. Feb 9 09:00:59.076886 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:00:59.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.108238 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:00:59.122384 kernel: ISO 9660 Extensions: RRIP_1991A Feb 9 09:00:59.123690 systemd[1]: Mounted media-configdrive.mount. Feb 9 09:00:59.124697 systemd[1]: Reached target local-fs.target. Feb 9 09:00:59.130631 systemd[1]: Starting ldconfig.service... Feb 9 09:00:59.134349 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:00:59.134505 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:00:59.137213 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:00:59.141351 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:00:59.143064 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:00:59.143163 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:00:59.145456 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:00:59.160385 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) Feb 9 09:00:59.162688 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:00:59.199854 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:00:59.200977 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:00:59.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.207113 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:00:59.218342 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:00:59.259399 systemd-tmpfiles[1043]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:00:59.329988 systemd-fsck[1047]: fsck.fat 4.2 (2021-01-31) Feb 9 09:00:59.329988 systemd-fsck[1047]: /dev/vda1: 789 files, 115332/258078 clusters Feb 9 09:00:59.334579 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:00:59.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.338053 systemd[1]: Mounting boot.mount... Feb 9 09:00:59.367821 systemd[1]: Mounted boot.mount. Feb 9 09:00:59.405257 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:00:59.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.546024 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:00:59.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.549262 systemd[1]: Starting audit-rules.service... Feb 9 09:00:59.552216 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:00:59.554771 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:00:59.561000 audit: BPF prog-id=27 op=LOAD Feb 9 09:00:59.563801 systemd[1]: Starting systemd-resolved.service... Feb 9 09:00:59.578000 audit: BPF prog-id=28 op=LOAD Feb 9 09:00:59.581238 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:00:59.587089 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:00:59.591480 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:00:59.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.596491 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:00:59.641000 audit[1059]: SYSTEM_BOOT pid=1059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.648874 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:00:59.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.652348 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:00:59.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.699129 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:00:59.712020 systemd[1]: Finished ldconfig.service. Feb 9 09:00:59.716403 augenrules[1070]: No rules Feb 9 09:00:59.718222 systemd[1]: Starting systemd-update-done.service... Feb 9 09:00:59.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:00:59.715000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:00:59.715000 audit[1070]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff08ee6330 a2=420 a3=0 items=0 ppid=1050 pid=1070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:00:59.715000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:00:59.719834 systemd[1]: Finished audit-rules.service. Feb 9 09:00:59.735840 systemd[1]: Finished systemd-update-done.service. Feb 9 09:00:59.756309 systemd-resolved[1054]: Positive Trust Anchors: Feb 9 09:00:59.756885 systemd-resolved[1054]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:00:59.757017 systemd-resolved[1054]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:00:59.767715 systemd-resolved[1054]: Using system hostname 'ci-3510.3.2-5-babd43ad13'. Feb 9 09:00:59.771431 systemd[1]: Started systemd-resolved.service. Feb 9 09:00:59.772175 systemd[1]: Reached target network.target. Feb 9 09:00:59.772662 systemd[1]: Reached target nss-lookup.target. Feb 9 09:00:59.778161 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:00:59.778912 systemd[1]: Reached target sysinit.target. Feb 9 09:00:59.782046 systemd[1]: Started motdgen.path. Feb 9 09:00:59.782657 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:00:59.783211 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:00:59.783902 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:00:59.783951 systemd[1]: Reached target paths.target. Feb 9 09:00:59.784422 systemd[1]: Reached target time-set.target. Feb 9 09:00:59.785095 systemd[1]: Started logrotate.timer. Feb 9 09:00:59.785805 systemd[1]: Started mdadm.timer. Feb 9 09:00:59.786168 systemd[1]: Reached target timers.target. Feb 9 09:00:59.787316 systemd[1]: Listening on dbus.socket. Feb 9 09:00:59.790648 systemd[1]: Starting docker.socket... Feb 9 09:00:59.798894 systemd[1]: Listening on sshd.socket. Feb 9 09:00:59.799645 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:00:59.800858 systemd[1]: Listening on docker.socket. Feb 9 09:00:59.801631 systemd[1]: Reached target sockets.target. Feb 9 09:00:59.802145 systemd[1]: Reached target basic.target. Feb 9 09:00:59.802691 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:00:59.802723 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:00:59.806475 systemd-networkd[999]: eth1: Gained IPv6LL Feb 9 09:00:59.807648 systemd[1]: Starting containerd.service... Feb 9 09:00:59.810437 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 09:00:59.817533 systemd[1]: Starting dbus.service... Feb 9 09:00:59.820912 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:00:59.826959 systemd[1]: Starting extend-filesystems.service... Feb 9 09:00:59.827658 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:00:59.832056 systemd[1]: Starting motdgen.service... Feb 9 09:00:59.835232 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:00:59.841657 systemd[1]: Starting prepare-critools.service... Feb 9 09:00:59.846865 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:00:59.851429 systemd[1]: Starting sshd-keygen.service... Feb 9 09:00:59.860663 systemd[1]: Starting systemd-logind.service... Feb 9 09:00:59.861334 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:00:59.861453 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:00:59.862304 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:00:59.865646 systemd[1]: Starting update-engine.service... Feb 9 09:00:59.870882 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:00:59.900322 jq[1099]: true Feb 9 09:00:59.902028 jq[1084]: false Feb 9 09:00:59.911514 tar[1102]: ./ Feb 9 09:00:59.913953 extend-filesystems[1085]: Found vda Feb 9 09:00:59.915175 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:00:59.915511 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:00:59.923313 jq[1107]: true Feb 9 09:00:59.925513 tar[1102]: ./loopback Feb 9 09:00:59.930653 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:00:59.943156 tar[1103]: crictl Feb 9 09:00:59.930939 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda1 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda2 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda3 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found usr Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda4 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda6 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda7 Feb 9 09:00:59.952255 extend-filesystems[1085]: Found vda9 Feb 9 09:00:59.952255 extend-filesystems[1085]: Checking size of /dev/vda9 Feb 9 09:00:59.979950 systemd[1]: Started dbus.service. Feb 9 09:00:59.979654 dbus-daemon[1083]: [system] SELinux support is enabled Feb 9 09:00:59.984496 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:01:01.308795 bash[1128]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:00:59.984753 systemd[1]: Finished motdgen.service. Feb 9 09:00:59.985603 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:01:01.314174 extend-filesystems[1085]: Resized partition /dev/vda9 Feb 9 09:00:59.985643 systemd[1]: Reached target system-config.target. Feb 9 09:01:01.320786 env[1130]: time="2024-02-09T09:01:01.272250514Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:01:01.329432 extend-filesystems[1145]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 09:01:01.341695 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 9 09:01:01.160453 systemd-resolved[1054]: Clock change detected. Flushing caches. Feb 9 09:01:01.160581 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:01:01.163076 systemd-timesyncd[1056]: Contacted time server 72.30.35.88:123 (0.flatcar.pool.ntp.org). Feb 9 09:01:01.163169 systemd-timesyncd[1056]: Initial clock synchronization to Fri 2024-02-09 09:01:01.160377 UTC. Feb 9 09:01:01.165102 systemd[1]: Starting user-configdrive.service... Feb 9 09:01:01.259463 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:01:01.300122 systemd-networkd[999]: eth0: Gained IPv6LL Feb 9 09:01:01.359117 coreos-cloudinit[1123]: 2024/02/09 09:01:01 Checking availability of "cloud-drive" Feb 9 09:01:01.359117 coreos-cloudinit[1123]: 2024/02/09 09:01:01 Fetching user-data from datasource of type "cloud-drive" Feb 9 09:01:01.359117 coreos-cloudinit[1123]: 2024/02/09 09:01:01 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 9 09:01:01.359117 coreos-cloudinit[1123]: 2024/02/09 09:01:01 Fetching meta-data from datasource of type "cloud-drive" Feb 9 09:01:01.359117 coreos-cloudinit[1123]: 2024/02/09 09:01:01 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 9 09:01:01.353872 systemd[1]: Started update-engine.service. Feb 9 09:01:01.359820 update_engine[1097]: I0209 09:01:01.347767 1097 main.cc:92] Flatcar Update Engine starting Feb 9 09:01:01.359820 update_engine[1097]: I0209 09:01:01.353956 1097 update_check_scheduler.cc:74] Next update check in 9m49s Feb 9 09:01:01.357276 systemd[1]: Started locksmithd.service. Feb 9 09:01:01.376821 coreos-cloudinit[1123]: Detected an Ignition config. Exiting... Feb 9 09:01:01.384110 systemd[1]: Finished user-configdrive.service. Feb 9 09:01:01.384989 systemd[1]: Reached target user-config.target. Feb 9 09:01:01.462576 tar[1102]: ./bandwidth Feb 9 09:01:01.532806 env[1130]: time="2024-02-09T09:01:01.532594508Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:01:01.533028 env[1130]: time="2024-02-09T09:01:01.532891781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.559124 env[1130]: time="2024-02-09T09:01:01.536844054Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:01:01.559124 env[1130]: time="2024-02-09T09:01:01.558998383Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.553207 systemd-logind[1095]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.559610821Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.559648988Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.559670824Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.559686743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.559842823Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.560523 env[1130]: time="2024-02-09T09:01:01.560219305Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:01:01.571906 env[1130]: time="2024-02-09T09:01:01.571577577Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:01:01.571906 env[1130]: time="2024-02-09T09:01:01.571664021Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:01:01.571906 env[1130]: time="2024-02-09T09:01:01.571833487Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:01:01.571906 env[1130]: time="2024-02-09T09:01:01.571853590Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:01:01.578770 systemd-logind[1095]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 09:01:01.580872 systemd-logind[1095]: New seat seat0. Feb 9 09:01:01.584493 systemd[1]: Started systemd-logind.service. Feb 9 09:01:01.617516 env[1130]: time="2024-02-09T09:01:01.617382379Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:01:01.617516 env[1130]: time="2024-02-09T09:01:01.617473183Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:01:01.617516 env[1130]: time="2024-02-09T09:01:01.617511595Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617566788Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617589770Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617636084Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617655205Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617676389Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617698516Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617717706Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617737378Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.617791 env[1130]: time="2024-02-09T09:01:01.617755086Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:01:01.618167 env[1130]: time="2024-02-09T09:01:01.617999013Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:01:01.618167 env[1130]: time="2024-02-09T09:01:01.618158457Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:01:01.618607 env[1130]: time="2024-02-09T09:01:01.618562685Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:01:01.618723 env[1130]: time="2024-02-09T09:01:01.618621785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618723 env[1130]: time="2024-02-09T09:01:01.618642174Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:01:01.618723 env[1130]: time="2024-02-09T09:01:01.618702418Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618723991Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618743327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618759342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618776883Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618795289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618836393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.618861 env[1130]: time="2024-02-09T09:01:01.618856990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.619131 env[1130]: time="2024-02-09T09:01:01.618880340Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:01:01.619131 env[1130]: time="2024-02-09T09:01:01.619092138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.619131 env[1130]: time="2024-02-09T09:01:01.619111446Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.619131 env[1130]: time="2024-02-09T09:01:01.619123929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.619291 env[1130]: time="2024-02-09T09:01:01.619136636Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:01:01.619291 env[1130]: time="2024-02-09T09:01:01.619155448Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:01:01.619291 env[1130]: time="2024-02-09T09:01:01.619168097Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:01:01.619291 env[1130]: time="2024-02-09T09:01:01.619187256Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:01:01.619291 env[1130]: time="2024-02-09T09:01:01.619232178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:01:01.619960 env[1130]: time="2024-02-09T09:01:01.619868369Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:01:01.624787 env[1130]: time="2024-02-09T09:01:01.620030069Z" level=info msg="Connect containerd service" Feb 9 09:01:01.624787 env[1130]: time="2024-02-09T09:01:01.620104423Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:01:01.626001 env[1130]: time="2024-02-09T09:01:01.625943293Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:01:01.628954 env[1130]: time="2024-02-09T09:01:01.628870994Z" level=info msg="Start subscribing containerd event" Feb 9 09:01:01.628954 env[1130]: time="2024-02-09T09:01:01.628965866Z" level=info msg="Start recovering state" Feb 9 09:01:01.629214 env[1130]: time="2024-02-09T09:01:01.629073622Z" level=info msg="Start event monitor" Feb 9 09:01:01.629214 env[1130]: time="2024-02-09T09:01:01.629116920Z" level=info msg="Start snapshots syncer" Feb 9 09:01:01.629214 env[1130]: time="2024-02-09T09:01:01.629130328Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:01:01.629214 env[1130]: time="2024-02-09T09:01:01.629140540Z" level=info msg="Start streaming server" Feb 9 09:01:01.630903 env[1130]: time="2024-02-09T09:01:01.630783950Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:01:01.631919 env[1130]: time="2024-02-09T09:01:01.631856244Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:01:01.632327 env[1130]: time="2024-02-09T09:01:01.632282929Z" level=info msg="containerd successfully booted in 0.362316s" Feb 9 09:01:01.632442 systemd[1]: Started containerd.service. Feb 9 09:01:01.681522 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 9 09:01:01.697599 coreos-metadata[1080]: Feb 09 09:01:01.696 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:01:01.786772 coreos-metadata[1080]: Feb 09 09:01:01.731 INFO Fetch successful Feb 9 09:01:01.790553 extend-filesystems[1145]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 09:01:01.790553 extend-filesystems[1145]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 9 09:01:01.790553 extend-filesystems[1145]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 9 09:01:01.798911 extend-filesystems[1085]: Resized filesystem in /dev/vda9 Feb 9 09:01:01.798911 extend-filesystems[1085]: Found vdb Feb 9 09:01:01.792430 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:01:01.793286 systemd[1]: Finished extend-filesystems.service. Feb 9 09:01:01.797404 unknown[1080]: wrote ssh authorized keys file for user: core Feb 9 09:01:01.834096 update-ssh-keys[1150]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:01:01.835159 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 09:01:01.848102 tar[1102]: ./ptp Feb 9 09:01:01.951992 tar[1102]: ./vlan Feb 9 09:01:02.056920 tar[1102]: ./host-device Feb 9 09:01:02.144328 tar[1102]: ./tuning Feb 9 09:01:02.221693 tar[1102]: ./vrf Feb 9 09:01:02.278616 tar[1102]: ./sbr Feb 9 09:01:02.392900 tar[1102]: ./tap Feb 9 09:01:02.493748 tar[1102]: ./dhcp Feb 9 09:01:02.651096 systemd[1]: Finished prepare-critools.service. Feb 9 09:01:02.680069 systemd[1]: Created slice system-sshd.slice. Feb 9 09:01:02.702696 tar[1102]: ./static Feb 9 09:01:02.741333 tar[1102]: ./firewall Feb 9 09:01:02.800030 tar[1102]: ./macvlan Feb 9 09:01:02.852234 tar[1102]: ./dummy Feb 9 09:01:02.904087 tar[1102]: ./bridge Feb 9 09:01:02.958848 tar[1102]: ./ipvlan Feb 9 09:01:03.009643 tar[1102]: ./portmap Feb 9 09:01:03.060873 tar[1102]: ./host-local Feb 9 09:01:03.136314 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:01:03.189581 locksmithd[1146]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:01:05.359147 sshd_keygen[1113]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:01:05.393893 systemd[1]: Finished sshd-keygen.service. Feb 9 09:01:05.399763 systemd[1]: Starting issuegen.service... Feb 9 09:01:05.402401 systemd[1]: Started sshd@0-64.227.99.217:22-139.178.89.65:54404.service. Feb 9 09:01:05.413956 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:01:05.414335 systemd[1]: Finished issuegen.service. Feb 9 09:01:05.417032 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:01:05.430544 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:01:05.433954 systemd[1]: Started getty@tty1.service. Feb 9 09:01:05.437463 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 09:01:05.438514 systemd[1]: Reached target getty.target. Feb 9 09:01:05.439176 systemd[1]: Reached target multi-user.target. Feb 9 09:01:05.442229 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:01:05.456510 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:01:05.456771 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:01:05.457651 systemd[1]: Startup finished in 1.069s (kernel) + 7.135s (initrd) + 10.333s (userspace) = 18.538s. Feb 9 09:01:05.491905 sshd[1167]: Accepted publickey for core from 139.178.89.65 port 54404 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:05.495684 sshd[1167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:05.509617 systemd[1]: Created slice user-500.slice. Feb 9 09:01:05.511082 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:01:05.521338 systemd-logind[1095]: New session 1 of user core. Feb 9 09:01:05.527111 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:01:05.529826 systemd[1]: Starting user@500.service... Feb 9 09:01:05.533986 (systemd)[1177]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:05.637880 systemd[1177]: Queued start job for default target default.target. Feb 9 09:01:05.638877 systemd[1177]: Reached target paths.target. Feb 9 09:01:05.638911 systemd[1177]: Reached target sockets.target. Feb 9 09:01:05.638931 systemd[1177]: Reached target timers.target. Feb 9 09:01:05.638949 systemd[1177]: Reached target basic.target. Feb 9 09:01:05.639105 systemd[1]: Started user@500.service. Feb 9 09:01:05.640534 systemd[1]: Started session-1.scope. Feb 9 09:01:05.641193 systemd[1177]: Reached target default.target. Feb 9 09:01:05.641432 systemd[1177]: Startup finished in 96ms. Feb 9 09:01:05.708668 systemd[1]: Started sshd@1-64.227.99.217:22-139.178.89.65:54420.service. Feb 9 09:01:05.763020 sshd[1186]: Accepted publickey for core from 139.178.89.65 port 54420 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:05.765268 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:05.773168 systemd[1]: Started session-2.scope. Feb 9 09:01:05.773930 systemd-logind[1095]: New session 2 of user core. Feb 9 09:01:05.847791 sshd[1186]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:05.853758 systemd[1]: sshd@1-64.227.99.217:22-139.178.89.65:54420.service: Deactivated successfully. Feb 9 09:01:05.854735 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 09:01:05.855769 systemd-logind[1095]: Session 2 logged out. Waiting for processes to exit. Feb 9 09:01:05.857678 systemd[1]: Started sshd@2-64.227.99.217:22-139.178.89.65:54434.service. Feb 9 09:01:05.859779 systemd-logind[1095]: Removed session 2. Feb 9 09:01:05.911140 sshd[1192]: Accepted publickey for core from 139.178.89.65 port 54434 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:05.913660 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:05.920142 systemd-logind[1095]: New session 3 of user core. Feb 9 09:01:05.920723 systemd[1]: Started session-3.scope. Feb 9 09:01:05.979706 sshd[1192]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:05.985256 systemd[1]: sshd@2-64.227.99.217:22-139.178.89.65:54434.service: Deactivated successfully. Feb 9 09:01:05.986010 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 09:01:05.987068 systemd-logind[1095]: Session 3 logged out. Waiting for processes to exit. Feb 9 09:01:05.988462 systemd[1]: Started sshd@3-64.227.99.217:22-139.178.89.65:54450.service. Feb 9 09:01:05.989848 systemd-logind[1095]: Removed session 3. Feb 9 09:01:06.041612 sshd[1198]: Accepted publickey for core from 139.178.89.65 port 54450 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:06.044432 sshd[1198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:06.051045 systemd-logind[1095]: New session 4 of user core. Feb 9 09:01:06.051572 systemd[1]: Started session-4.scope. Feb 9 09:01:06.127739 sshd[1198]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:06.133245 systemd[1]: sshd@3-64.227.99.217:22-139.178.89.65:54450.service: Deactivated successfully. Feb 9 09:01:06.134190 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:01:06.135606 systemd-logind[1095]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:01:06.137165 systemd[1]: Started sshd@4-64.227.99.217:22-139.178.89.65:54466.service. Feb 9 09:01:06.138904 systemd-logind[1095]: Removed session 4. Feb 9 09:01:06.194564 sshd[1204]: Accepted publickey for core from 139.178.89.65 port 54466 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:06.196850 sshd[1204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:06.203113 systemd-logind[1095]: New session 5 of user core. Feb 9 09:01:06.203872 systemd[1]: Started session-5.scope. Feb 9 09:01:06.280142 sudo[1207]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:01:06.280830 sudo[1207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:01:06.291718 dbus-daemon[1083]: \xd0\xcd,D\xe9U: received setenforce notice (enforcing=-1432936432) Feb 9 09:01:06.293017 sudo[1207]: pam_unix(sudo:session): session closed for user root Feb 9 09:01:06.299240 sshd[1204]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:06.306272 systemd[1]: Started sshd@5-64.227.99.217:22-139.178.89.65:54476.service. Feb 9 09:01:06.308860 systemd[1]: sshd@4-64.227.99.217:22-139.178.89.65:54466.service: Deactivated successfully. Feb 9 09:01:06.309946 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:01:06.311980 systemd-logind[1095]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:01:06.313673 systemd-logind[1095]: Removed session 5. Feb 9 09:01:06.357704 sshd[1210]: Accepted publickey for core from 139.178.89.65 port 54476 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:06.360309 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:06.366116 systemd[1]: Started session-6.scope. Feb 9 09:01:06.367032 systemd-logind[1095]: New session 6 of user core. Feb 9 09:01:06.434893 sudo[1215]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:01:06.435612 sudo[1215]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:01:06.441619 sudo[1215]: pam_unix(sudo:session): session closed for user root Feb 9 09:01:06.449037 sudo[1214]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:01:06.449909 sudo[1214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:01:06.463610 systemd[1]: Stopping audit-rules.service... Feb 9 09:01:06.464000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:01:06.465961 auditctl[1218]: No rules Feb 9 09:01:06.551276 kernel: kauditd_printk_skb: 133 callbacks suppressed Feb 9 09:01:06.551464 kernel: audit: type=1305 audit(1707469266.464:176): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:01:06.552296 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:01:06.552688 systemd[1]: Stopped audit-rules.service. Feb 9 09:01:06.557101 systemd[1]: Starting audit-rules.service... Feb 9 09:01:06.464000 audit[1218]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbff60c80 a2=420 a3=0 items=0 ppid=1 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:06.565570 kernel: audit: type=1300 audit(1707469266.464:176): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbff60c80 a2=420 a3=0 items=0 ppid=1 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:06.464000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:01:06.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.587276 kernel: audit: type=1327 audit(1707469266.464:176): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:01:06.587435 kernel: audit: type=1131 audit(1707469266.552:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.589897 augenrules[1236]: No rules Feb 9 09:01:06.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.591102 systemd[1]: Finished audit-rules.service. Feb 9 09:01:06.595324 sudo[1214]: pam_unix(sudo:session): session closed for user root Feb 9 09:01:06.595652 kernel: audit: type=1130 audit(1707469266.590:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.594000 audit[1214]: USER_END pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.600555 kernel: audit: type=1106 audit(1707469266.594:179): pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.601207 sshd[1210]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:06.595000 audit[1214]: CRED_DISP pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.606690 kernel: audit: type=1104 audit(1707469266.595:180): pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.602000 audit[1210]: USER_END pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.610750 systemd[1]: sshd@5-64.227.99.217:22-139.178.89.65:54476.service: Deactivated successfully. Feb 9 09:01:06.602000 audit[1210]: CRED_DISP pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.611616 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:01:06.615477 kernel: audit: type=1106 audit(1707469266.602:181): pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.615663 kernel: audit: type=1104 audit(1707469266.602:182): pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.615742 kernel: audit: type=1131 audit(1707469266.610:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-64.227.99.217:22-139.178.89.65:54476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-64.227.99.217:22-139.178.89.65:54476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.616110 systemd-logind[1095]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:01:06.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.227.99.217:22-139.178.89.65:54492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.617896 systemd[1]: Started sshd@6-64.227.99.217:22-139.178.89.65:54492.service. Feb 9 09:01:06.621038 systemd-logind[1095]: Removed session 6. Feb 9 09:01:06.669000 audit[1242]: USER_ACCT pid=1242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.670582 sshd[1242]: Accepted publickey for core from 139.178.89.65 port 54492 ssh2: RSA SHA256:zxCjWE6I1sqRNr8f+A5DoPj4YLVmU7ObDiNpO/GSq00 Feb 9 09:01:06.671000 audit[1242]: CRED_ACQ pid=1242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.671000 audit[1242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2fd30170 a2=3 a3=0 items=0 ppid=1 pid=1242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:06.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:01:06.673152 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:01:06.680849 systemd[1]: Started session-7.scope. Feb 9 09:01:06.681852 systemd-logind[1095]: New session 7 of user core. Feb 9 09:01:06.689000 audit[1242]: USER_START pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.706000 audit[1245]: CRED_ACQ pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:06.760000 audit[1246]: USER_ACCT pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.761350 sudo[1246]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:01:06.761985 sudo[1246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:01:06.761000 audit[1246]: CRED_REFR pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:06.764000 audit[1246]: USER_START pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:07.561053 systemd[1]: Reloading. Feb 9 09:01:07.668354 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-09T09:01:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:01:07.668401 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-09T09:01:07Z" level=info msg="torcx already run" Feb 9 09:01:07.777399 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:01:07.777429 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:01:07.806417 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.907000 audit: BPF prog-id=34 op=LOAD Feb 9 09:01:07.907000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.909000 audit: BPF prog-id=35 op=LOAD Feb 9 09:01:07.909000 audit: BPF prog-id=23 op=UNLOAD Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.911000 audit: BPF prog-id=36 op=LOAD Feb 9 09:01:07.911000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit: BPF prog-id=37 op=LOAD Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.912000 audit: BPF prog-id=38 op=LOAD Feb 9 09:01:07.912000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:01:07.912000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.917000 audit: BPF prog-id=39 op=LOAD Feb 9 09:01:07.917000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit: BPF prog-id=40 op=LOAD Feb 9 09:01:07.918000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit: BPF prog-id=41 op=LOAD Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.919000 audit: BPF prog-id=42 op=LOAD Feb 9 09:01:07.919000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:01:07.919000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.921000 audit: BPF prog-id=43 op=LOAD Feb 9 09:01:07.921000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit: BPF prog-id=44 op=LOAD Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.922000 audit: BPF prog-id=45 op=LOAD Feb 9 09:01:07.922000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:01:07.922000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit: BPF prog-id=46 op=LOAD Feb 9 09:01:07.923000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit: BPF prog-id=47 op=LOAD Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:07.923000 audit: BPF prog-id=48 op=LOAD Feb 9 09:01:07.923000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:01:07.923000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:01:07.935433 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:01:07.945764 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:01:07.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:07.947761 systemd[1]: Reached target network-online.target. Feb 9 09:01:07.950865 systemd[1]: Started kubelet.service. Feb 9 09:01:07.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:07.972151 systemd[1]: Starting coreos-metadata.service... Feb 9 09:01:08.037501 coreos-metadata[1330]: Feb 09 09:01:08.037 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:01:08.050879 coreos-metadata[1330]: Feb 09 09:01:08.050 INFO Fetch successful Feb 9 09:01:08.068003 kubelet[1322]: E0209 09:01:08.067941 1322 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:01:08.068017 systemd[1]: Finished coreos-metadata.service. Feb 9 09:01:08.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:08.074728 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:01:08.074910 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:01:08.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:01:08.509946 systemd[1]: Stopped kubelet.service. Feb 9 09:01:08.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:08.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:08.537640 systemd[1]: Reloading. Feb 9 09:01:08.623926 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2024-02-09T09:01:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:01:08.623959 /usr/lib/systemd/system-generators/torcx-generator[1385]: time="2024-02-09T09:01:08Z" level=info msg="torcx already run" Feb 9 09:01:08.730952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:01:08.731297 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:01:08.753008 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:01:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.835000 audit: BPF prog-id=49 op=LOAD Feb 9 09:01:08.836000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.837000 audit: BPF prog-id=50 op=LOAD Feb 9 09:01:08.838000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.840000 audit: BPF prog-id=51 op=LOAD Feb 9 09:01:08.840000 audit: BPF prog-id=36 op=UNLOAD Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit: BPF prog-id=52 op=LOAD Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.842000 audit: BPF prog-id=53 op=LOAD Feb 9 09:01:08.842000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:01:08.842000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.846000 audit: BPF prog-id=54 op=LOAD Feb 9 09:01:08.847000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:01:08.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.848000 audit: BPF prog-id=55 op=LOAD Feb 9 09:01:08.848000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.849000 audit: BPF prog-id=56 op=LOAD Feb 9 09:01:08.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.850000 audit: BPF prog-id=57 op=LOAD Feb 9 09:01:08.850000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:01:08.850000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit: BPF prog-id=58 op=LOAD Feb 9 09:01:08.853000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit: BPF prog-id=59 op=LOAD Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.853000 audit: BPF prog-id=60 op=LOAD Feb 9 09:01:08.853000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:01:08.853000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit: BPF prog-id=61 op=LOAD Feb 9 09:01:08.854000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit: BPF prog-id=62 op=LOAD Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:08.855000 audit: BPF prog-id=63 op=LOAD Feb 9 09:01:08.855000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:01:08.855000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:01:08.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:08.880181 systemd[1]: Started kubelet.service. Feb 9 09:01:08.962346 kubelet[1432]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:01:08.962897 kubelet[1432]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:01:08.963032 kubelet[1432]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:01:08.963231 kubelet[1432]: I0209 09:01:08.963183 1432 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:01:09.967412 kubelet[1432]: I0209 09:01:09.967335 1432 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 09:01:09.967412 kubelet[1432]: I0209 09:01:09.967390 1432 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:01:09.967855 kubelet[1432]: I0209 09:01:09.967687 1432 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 09:01:09.970402 kubelet[1432]: I0209 09:01:09.970359 1432 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:01:09.973915 kubelet[1432]: I0209 09:01:09.973875 1432 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:01:09.974240 kubelet[1432]: I0209 09:01:09.974186 1432 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:01:09.974339 kubelet[1432]: I0209 09:01:09.974267 1432 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:01:09.974339 kubelet[1432]: I0209 09:01:09.974291 1432 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:01:09.974339 kubelet[1432]: I0209 09:01:09.974305 1432 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 09:01:09.974589 kubelet[1432]: I0209 09:01:09.974434 1432 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:01:09.979163 kubelet[1432]: I0209 09:01:09.979125 1432 kubelet.go:405] "Attempting to sync node with API server" Feb 9 09:01:09.979813 kubelet[1432]: I0209 09:01:09.979786 1432 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:01:09.980026 kubelet[1432]: I0209 09:01:09.980011 1432 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:01:09.980459 kubelet[1432]: I0209 09:01:09.980446 1432 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:01:09.980608 kubelet[1432]: E0209 09:01:09.980373 1432 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:09.980608 kubelet[1432]: E0209 09:01:09.980411 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:09.981599 kubelet[1432]: I0209 09:01:09.981580 1432 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:01:09.982085 kubelet[1432]: W0209 09:01:09.982070 1432 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:01:09.983172 kubelet[1432]: I0209 09:01:09.983156 1432 server.go:1168] "Started kubelet" Feb 9 09:01:09.984000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:09.984000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:01:09.984000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000663ef0 a1=c0007b56c8 a2=c000663ec0 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:09.984000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:01:09.985001 kubelet[1432]: I0209 09:01:09.984977 1432 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:01:09.984000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:09.984000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:01:09.984000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c36240 a1=c0007b56e0 a2=c000663f80 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:09.984000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:01:09.985313 kubelet[1432]: I0209 09:01:09.985295 1432 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:01:09.985524 kubelet[1432]: I0209 09:01:09.985509 1432 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:01:09.985714 kubelet[1432]: E0209 09:01:09.985687 1432 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:01:09.985797 kubelet[1432]: E0209 09:01:09.985727 1432 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:01:09.991885 kubelet[1432]: I0209 09:01:09.991846 1432 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:01:09.992879 kubelet[1432]: I0209 09:01:09.992840 1432 server.go:461] "Adding debug handlers to kubelet server" Feb 9 09:01:09.997203 kubelet[1432]: I0209 09:01:09.997161 1432 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:01:10.001354 kubelet[1432]: I0209 09:01:10.001321 1432 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 09:01:10.002402 kubelet[1432]: I0209 09:01:10.002359 1432 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 09:01:10.003312 kubelet[1432]: E0209 09:01:10.003211 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b22641263d5350", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 9, 983122256, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 9, 983122256, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.003776 kubelet[1432]: W0209 09:01:10.003758 1432 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "64.227.99.217" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:01:10.003900 kubelet[1432]: E0209 09:01:10.003890 1432 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "64.227.99.217" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:01:10.003987 kubelet[1432]: W0209 09:01:10.003976 1432 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:01:10.004062 kubelet[1432]: E0209 09:01:10.004054 1432 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:01:10.005923 kubelet[1432]: E0209 09:01:10.005890 1432 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.227.99.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 09:01:10.006177 kubelet[1432]: W0209 09:01:10.006153 1432 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:01:10.006310 kubelet[1432]: E0209 09:01:10.006297 1432 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:01:10.006469 kubelet[1432]: E0209 09:01:10.006402 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b226412664ddff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 9, 985713663, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 9, 985713663, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.037000 audit[1444]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.037000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc46ab3650 a2=0 a3=7ffc46ab363c items=0 ppid=1432 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:01:10.039000 audit[1449]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.039000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc11291e80 a2=0 a3=7ffc11291e6c items=0 ppid=1432 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:01:10.047283 kubelet[1432]: I0209 09:01:10.047247 1432 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:01:10.047520 kubelet[1432]: I0209 09:01:10.047479 1432 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:01:10.047625 kubelet[1432]: I0209 09:01:10.047612 1432 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:01:10.048044 kubelet[1432]: E0209 09:01:10.047937 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa7fda", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.227.99.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45851610, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45851610, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.049858 kubelet[1432]: E0209 09:01:10.049675 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa9dff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.227.99.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45859327, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45859327, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.051526 kubelet[1432]: E0209 09:01:10.051048 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fab13e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.227.99.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45864254, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45864254, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.055014 kubelet[1432]: I0209 09:01:10.054970 1432 policy_none.go:49] "None policy: Start" Feb 9 09:01:10.056570 kubelet[1432]: I0209 09:01:10.056545 1432 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:01:10.056741 kubelet[1432]: I0209 09:01:10.056729 1432 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:01:10.042000 audit[1451]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.042000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb2d2fab0 a2=0 a3=7ffdb2d2fa9c items=0 ppid=1432 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:01:10.066432 systemd[1]: Created slice kubepods.slice. Feb 9 09:01:10.069000 audit[1457]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.069000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf2365c10 a2=0 a3=7ffcf2365bfc items=0 ppid=1432 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:01:10.072954 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:01:10.078374 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:01:10.085745 kubelet[1432]: I0209 09:01:10.085706 1432 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:01:10.086055 kubelet[1432]: I0209 09:01:10.086030 1432 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:01:10.085000 audit[1432]: AVC avc: denied { mac_admin } for pid=1432 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:10.085000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:01:10.085000 audit[1432]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c5d7d0 a1=c000f7af00 a2=c000c5d7a0 a3=25 items=0 ppid=1 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.085000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:01:10.087041 kubelet[1432]: I0209 09:01:10.086660 1432 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:01:10.090274 kubelet[1432]: E0209 09:01:10.090240 1432 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"64.227.99.217\" not found" Feb 9 09:01:10.091584 kubelet[1432]: E0209 09:01:10.091427 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b226412c95ad72", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 89575794, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 89575794, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.103262 kubelet[1432]: I0209 09:01:10.103230 1432 kubelet_node_status.go:70] "Attempting to register node" node="64.227.99.217" Feb 9 09:01:10.113620 kubelet[1432]: E0209 09:01:10.113427 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa7fda", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.227.99.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45851610, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 103189704, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa7fda" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.114348 kubelet[1432]: E0209 09:01:10.114302 1432 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.227.99.217" Feb 9 09:01:10.117166 kubelet[1432]: E0209 09:01:10.117018 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa9dff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.227.99.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45859327, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 103198265, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa9dff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.118784 kubelet[1432]: E0209 09:01:10.118624 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fab13e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.227.99.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45864254, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 103201300, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fab13e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.139000 audit[1462]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.139000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc527aa420 a2=0 a3=7ffc527aa40c items=0 ppid=1432 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:01:10.142297 kubelet[1432]: I0209 09:01:10.142260 1432 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:01:10.143000 audit[1463]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:10.143000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeabb6f680 a2=0 a3=7ffeabb6f66c items=0 ppid=1432 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:01:10.145058 kubelet[1432]: I0209 09:01:10.144851 1432 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:01:10.145058 kubelet[1432]: I0209 09:01:10.144926 1432 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 09:01:10.145058 kubelet[1432]: I0209 09:01:10.144958 1432 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 09:01:10.145058 kubelet[1432]: E0209 09:01:10.145056 1432 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 09:01:10.146000 audit[1464]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.146000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6ef4dfb0 a2=0 a3=7fff6ef4df9c items=0 ppid=1432 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:01:10.147943 kubelet[1432]: W0209 09:01:10.147907 1432 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:01:10.148076 kubelet[1432]: E0209 09:01:10.147950 1432 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:01:10.148000 audit[1465]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:10.148000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce0798af0 a2=0 a3=7ffce0798adc items=0 ppid=1432 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:01:10.150000 audit[1466]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.150000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff46743aa0 a2=0 a3=7fff46743a8c items=0 ppid=1432 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.150000 audit[1467]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:10.150000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd0cf7a960 a2=0 a3=7ffd0cf7a94c items=0 ppid=1432 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:01:10.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:01:10.152000 audit[1468]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:10.152000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffac73e1f0 a2=0 a3=7fffac73e1dc items=0 ppid=1432 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:01:10.153000 audit[1469]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:10.153000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf668ae00 a2=0 a3=7ffcf668adec items=0 ppid=1432 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:10.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:01:10.209008 kubelet[1432]: E0209 09:01:10.208960 1432 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.227.99.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 09:01:10.315565 kubelet[1432]: I0209 09:01:10.315521 1432 kubelet_node_status.go:70] "Attempting to register node" node="64.227.99.217" Feb 9 09:01:10.318165 kubelet[1432]: E0209 09:01:10.318070 1432 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.227.99.217" Feb 9 09:01:10.318351 kubelet[1432]: E0209 09:01:10.318011 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa7fda", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.227.99.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45851610, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 315455658, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa7fda" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.320335 kubelet[1432]: E0209 09:01:10.320159 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa9dff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.227.99.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45859327, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 315464444, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa9dff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.322388 kubelet[1432]: E0209 09:01:10.322237 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fab13e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.227.99.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45864254, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 315468617, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fab13e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.612279 kubelet[1432]: E0209 09:01:10.612080 1432 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.227.99.217\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 09:01:10.719745 kubelet[1432]: I0209 09:01:10.719681 1432 kubelet_node_status.go:70] "Attempting to register node" node="64.227.99.217" Feb 9 09:01:10.721881 kubelet[1432]: E0209 09:01:10.721822 1432 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.227.99.217" Feb 9 09:01:10.722776 kubelet[1432]: E0209 09:01:10.722600 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa7fda", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.227.99.217 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45851610, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 719624118, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa7fda" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.724921 kubelet[1432]: E0209 09:01:10.724814 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fa9dff", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.227.99.217 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45859327, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 719632496, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fa9dff" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.726800 kubelet[1432]: E0209 09:01:10.726579 1432 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217.17b2264129fab13e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.227.99.217", UID:"64.227.99.217", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.227.99.217 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.227.99.217"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 45864254, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 1, 10, 719642505, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "64.227.99.217.17b2264129fab13e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:01:10.970523 kubelet[1432]: I0209 09:01:10.970368 1432 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 09:01:10.981780 kubelet[1432]: E0209 09:01:10.981715 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:11.374573 kubelet[1432]: E0209 09:01:11.374432 1432 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "64.227.99.217" not found Feb 9 09:01:11.419422 kubelet[1432]: E0209 09:01:11.419379 1432 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"64.227.99.217\" not found" node="64.227.99.217" Feb 9 09:01:11.523709 kubelet[1432]: I0209 09:01:11.523679 1432 kubelet_node_status.go:70] "Attempting to register node" node="64.227.99.217" Feb 9 09:01:11.531278 kubelet[1432]: I0209 09:01:11.531233 1432 kubelet_node_status.go:73] "Successfully registered node" node="64.227.99.217" Feb 9 09:01:11.670758 kubelet[1432]: I0209 09:01:11.670638 1432 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 09:01:11.671598 env[1130]: time="2024-02-09T09:01:11.671544321Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:01:11.672246 kubelet[1432]: I0209 09:01:11.672215 1432 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 09:01:11.904000 audit[1246]: USER_END pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.906046 kernel: kauditd_printk_skb: 410 callbacks suppressed Feb 9 09:01:11.906093 kernel: audit: type=1106 audit(1707469271.904:559): pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.905078 sudo[1246]: pam_unix(sudo:session): session closed for user root Feb 9 09:01:11.912260 kernel: audit: type=1104 audit(1707469271.904:560): pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.904000 audit[1246]: CRED_DISP pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.912085 sshd[1242]: pam_unix(sshd:session): session closed for user core Feb 9 09:01:11.912000 audit[1242]: USER_END pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:11.917538 kernel: audit: type=1106 audit(1707469271.912:561): pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:11.917579 systemd[1]: sshd@6-64.227.99.217:22-139.178.89.65:54492.service: Deactivated successfully. Feb 9 09:01:11.912000 audit[1242]: CRED_DISP pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:11.922103 kernel: audit: type=1104 audit(1707469271.912:562): pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:01:11.922305 kernel: audit: type=1131 audit(1707469271.917:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.227.99.217:22-139.178.89.65:54492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.227.99.217:22-139.178.89.65:54492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:01:11.918574 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:01:11.920386 systemd-logind[1095]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:01:11.921440 systemd-logind[1095]: Removed session 7. Feb 9 09:01:11.981864 kubelet[1432]: E0209 09:01:11.981822 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:11.982407 kubelet[1432]: I0209 09:01:11.981886 1432 apiserver.go:52] "Watching apiserver" Feb 9 09:01:11.985441 kubelet[1432]: I0209 09:01:11.985392 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:01:11.985667 kubelet[1432]: I0209 09:01:11.985497 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:01:11.985667 kubelet[1432]: I0209 09:01:11.985535 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:01:11.986061 kubelet[1432]: E0209 09:01:11.986020 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:11.990973 systemd[1]: Created slice kubepods-besteffort-podc0e35e2f_8446_4b0a_b8df_0b8af36d1ce1.slice. Feb 9 09:01:12.003996 systemd[1]: Created slice kubepods-besteffort-podd9995917_cc94_40a8_9341_9a9c8487a0b9.slice. Feb 9 09:01:12.004709 kubelet[1432]: I0209 09:01:12.004681 1432 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 09:01:12.015443 kubelet[1432]: I0209 09:01:12.015401 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-lib-modules\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015641 kubelet[1432]: I0209 09:01:12.015460 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-policysync\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015641 kubelet[1432]: I0209 09:01:12.015510 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-var-run-calico\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015641 kubelet[1432]: I0209 09:01:12.015533 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1-kube-proxy\") pod \"kube-proxy-r8fjp\" (UID: \"c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1\") " pod="kube-system/kube-proxy-r8fjp" Feb 9 09:01:12.015641 kubelet[1432]: I0209 09:01:12.015554 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-xtables-lock\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015641 kubelet[1432]: I0209 09:01:12.015577 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d9995917-cc94-40a8-9341-9a9c8487a0b9-tigera-ca-bundle\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015803 kubelet[1432]: I0209 09:01:12.015603 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-var-lib-calico\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015803 kubelet[1432]: I0209 09:01:12.015623 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-cni-net-dir\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015803 kubelet[1432]: I0209 09:01:12.015645 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6jsjk\" (UniqueName: \"kubernetes.io/projected/d9995917-cc94-40a8-9341-9a9c8487a0b9-kube-api-access-6jsjk\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015803 kubelet[1432]: I0209 09:01:12.015666 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/84c464ab-548d-401b-b871-d64b4077842f-socket-dir\") pod \"csi-node-driver-wd7hh\" (UID: \"84c464ab-548d-401b-b871-d64b4077842f\") " pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:12.015803 kubelet[1432]: I0209 09:01:12.015686 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/84c464ab-548d-401b-b871-d64b4077842f-registration-dir\") pod \"csi-node-driver-wd7hh\" (UID: \"84c464ab-548d-401b-b871-d64b4077842f\") " pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:12.015945 kubelet[1432]: I0209 09:01:12.015708 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d9995917-cc94-40a8-9341-9a9c8487a0b9-node-certs\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015945 kubelet[1432]: I0209 09:01:12.015743 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-flexvol-driver-host\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.015945 kubelet[1432]: I0209 09:01:12.015768 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/84c464ab-548d-401b-b871-d64b4077842f-varrun\") pod \"csi-node-driver-wd7hh\" (UID: \"84c464ab-548d-401b-b871-d64b4077842f\") " pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:12.015945 kubelet[1432]: I0209 09:01:12.015789 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/84c464ab-548d-401b-b871-d64b4077842f-kubelet-dir\") pod \"csi-node-driver-wd7hh\" (UID: \"84c464ab-548d-401b-b871-d64b4077842f\") " pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:12.015945 kubelet[1432]: I0209 09:01:12.015810 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbmdp\" (UniqueName: \"kubernetes.io/projected/c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1-kube-api-access-fbmdp\") pod \"kube-proxy-r8fjp\" (UID: \"c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1\") " pod="kube-system/kube-proxy-r8fjp" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015829 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-cni-bin-dir\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015853 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d9995917-cc94-40a8-9341-9a9c8487a0b9-cni-log-dir\") pod \"calico-node-rw959\" (UID: \"d9995917-cc94-40a8-9341-9a9c8487a0b9\") " pod="calico-system/calico-node-rw959" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015874 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7k8zs\" (UniqueName: \"kubernetes.io/projected/84c464ab-548d-401b-b871-d64b4077842f-kube-api-access-7k8zs\") pod \"csi-node-driver-wd7hh\" (UID: \"84c464ab-548d-401b-b871-d64b4077842f\") " pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015894 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1-xtables-lock\") pod \"kube-proxy-r8fjp\" (UID: \"c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1\") " pod="kube-system/kube-proxy-r8fjp" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015914 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1-lib-modules\") pod \"kube-proxy-r8fjp\" (UID: \"c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1\") " pod="kube-system/kube-proxy-r8fjp" Feb 9 09:01:12.016080 kubelet[1432]: I0209 09:01:12.015925 1432 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:01:12.117599 kubelet[1432]: E0209 09:01:12.117565 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.117842 kubelet[1432]: W0209 09:01:12.117813 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.118002 kubelet[1432]: E0209 09:01:12.117982 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.118524 kubelet[1432]: E0209 09:01:12.118505 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.118661 kubelet[1432]: W0209 09:01:12.118644 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.118777 kubelet[1432]: E0209 09:01:12.118759 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.119027 kubelet[1432]: E0209 09:01:12.119010 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.119076 kubelet[1432]: W0209 09:01:12.119026 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.119076 kubelet[1432]: E0209 09:01:12.119049 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.119238 kubelet[1432]: E0209 09:01:12.119225 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.119238 kubelet[1432]: W0209 09:01:12.119237 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.119352 kubelet[1432]: E0209 09:01:12.119338 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.119429 kubelet[1432]: E0209 09:01:12.119416 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.119429 kubelet[1432]: W0209 09:01:12.119427 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.119567 kubelet[1432]: E0209 09:01:12.119552 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.119665 kubelet[1432]: E0209 09:01:12.119603 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.119728 kubelet[1432]: W0209 09:01:12.119716 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.119857 kubelet[1432]: E0209 09:01:12.119833 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.120089 kubelet[1432]: E0209 09:01:12.120078 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.120157 kubelet[1432]: W0209 09:01:12.120146 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.120242 kubelet[1432]: E0209 09:01:12.120229 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.120452 kubelet[1432]: E0209 09:01:12.120442 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.120543 kubelet[1432]: W0209 09:01:12.120532 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.120630 kubelet[1432]: E0209 09:01:12.120617 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.120847 kubelet[1432]: E0209 09:01:12.120835 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.120921 kubelet[1432]: W0209 09:01:12.120910 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.121000 kubelet[1432]: E0209 09:01:12.120988 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.121198 kubelet[1432]: E0209 09:01:12.121187 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.121266 kubelet[1432]: W0209 09:01:12.121255 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.121343 kubelet[1432]: E0209 09:01:12.121331 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.121638 kubelet[1432]: E0209 09:01:12.121625 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.121727 kubelet[1432]: W0209 09:01:12.121715 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.121807 kubelet[1432]: E0209 09:01:12.121793 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.122027 kubelet[1432]: E0209 09:01:12.122016 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.122099 kubelet[1432]: W0209 09:01:12.122088 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.122361 kubelet[1432]: E0209 09:01:12.122341 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.122628 kubelet[1432]: E0209 09:01:12.122617 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.122712 kubelet[1432]: W0209 09:01:12.122700 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.122802 kubelet[1432]: E0209 09:01:12.122787 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.123009 kubelet[1432]: E0209 09:01:12.122997 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.123085 kubelet[1432]: W0209 09:01:12.123074 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.123171 kubelet[1432]: E0209 09:01:12.123159 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.123383 kubelet[1432]: E0209 09:01:12.123372 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.123462 kubelet[1432]: W0209 09:01:12.123451 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.123613 kubelet[1432]: E0209 09:01:12.123599 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.123780 kubelet[1432]: E0209 09:01:12.123767 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.123780 kubelet[1432]: W0209 09:01:12.123777 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.123908 kubelet[1432]: E0209 09:01:12.123888 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.124011 kubelet[1432]: E0209 09:01:12.123991 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.124011 kubelet[1432]: W0209 09:01:12.124007 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.124126 kubelet[1432]: E0209 09:01:12.124102 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.124273 kubelet[1432]: E0209 09:01:12.124258 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.124273 kubelet[1432]: W0209 09:01:12.124271 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.124378 kubelet[1432]: E0209 09:01:12.124371 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.124554 kubelet[1432]: E0209 09:01:12.124538 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.124554 kubelet[1432]: W0209 09:01:12.124551 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.124650 kubelet[1432]: E0209 09:01:12.124643 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.124806 kubelet[1432]: E0209 09:01:12.124792 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.124806 kubelet[1432]: W0209 09:01:12.124805 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.124918 kubelet[1432]: E0209 09:01:12.124904 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.125074 kubelet[1432]: E0209 09:01:12.125050 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.125074 kubelet[1432]: W0209 09:01:12.125070 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.125190 kubelet[1432]: E0209 09:01:12.125174 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.125285 kubelet[1432]: E0209 09:01:12.125271 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.125285 kubelet[1432]: W0209 09:01:12.125284 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.125390 kubelet[1432]: E0209 09:01:12.125377 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.125562 kubelet[1432]: E0209 09:01:12.125546 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.125562 kubelet[1432]: W0209 09:01:12.125557 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.125691 kubelet[1432]: E0209 09:01:12.125675 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.125809 kubelet[1432]: E0209 09:01:12.125742 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.125896 kubelet[1432]: W0209 09:01:12.125882 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.126000 kubelet[1432]: E0209 09:01:12.125981 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.126418 kubelet[1432]: E0209 09:01:12.126402 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.126538 kubelet[1432]: W0209 09:01:12.126524 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.126623 kubelet[1432]: E0209 09:01:12.126607 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.126864 kubelet[1432]: E0209 09:01:12.126850 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.126940 kubelet[1432]: W0209 09:01:12.126928 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.127034 kubelet[1432]: E0209 09:01:12.127018 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.127242 kubelet[1432]: E0209 09:01:12.127232 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.127308 kubelet[1432]: W0209 09:01:12.127296 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.127378 kubelet[1432]: E0209 09:01:12.127366 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.127693 kubelet[1432]: E0209 09:01:12.127679 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.127802 kubelet[1432]: W0209 09:01:12.127789 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.127896 kubelet[1432]: E0209 09:01:12.127883 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.128101 kubelet[1432]: E0209 09:01:12.128090 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.128163 kubelet[1432]: W0209 09:01:12.128152 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.128235 kubelet[1432]: E0209 09:01:12.128223 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.128431 kubelet[1432]: E0209 09:01:12.128421 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.128525 kubelet[1432]: W0209 09:01:12.128510 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.128628 kubelet[1432]: E0209 09:01:12.128614 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.128842 kubelet[1432]: E0209 09:01:12.128830 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.128903 kubelet[1432]: W0209 09:01:12.128892 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.128976 kubelet[1432]: E0209 09:01:12.128962 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.129174 kubelet[1432]: E0209 09:01:12.129163 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.129242 kubelet[1432]: W0209 09:01:12.129230 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.129319 kubelet[1432]: E0209 09:01:12.129306 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.129578 kubelet[1432]: E0209 09:01:12.129567 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.129661 kubelet[1432]: W0209 09:01:12.129647 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.129740 kubelet[1432]: E0209 09:01:12.129725 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.129996 kubelet[1432]: E0209 09:01:12.129982 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.130077 kubelet[1432]: W0209 09:01:12.130064 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.130273 kubelet[1432]: E0209 09:01:12.130251 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.130464 kubelet[1432]: E0209 09:01:12.130454 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.130559 kubelet[1432]: W0209 09:01:12.130545 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.130645 kubelet[1432]: E0209 09:01:12.130631 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.130869 kubelet[1432]: E0209 09:01:12.130857 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.130931 kubelet[1432]: W0209 09:01:12.130920 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.131028 kubelet[1432]: E0209 09:01:12.131010 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.131232 kubelet[1432]: E0209 09:01:12.131220 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.131299 kubelet[1432]: W0209 09:01:12.131288 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.131390 kubelet[1432]: E0209 09:01:12.131373 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.131628 kubelet[1432]: E0209 09:01:12.131616 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.131703 kubelet[1432]: W0209 09:01:12.131690 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.131814 kubelet[1432]: E0209 09:01:12.131785 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.132059 kubelet[1432]: E0209 09:01:12.132047 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.132137 kubelet[1432]: W0209 09:01:12.132126 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.132223 kubelet[1432]: E0209 09:01:12.132208 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.132421 kubelet[1432]: E0209 09:01:12.132410 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.132654 kubelet[1432]: W0209 09:01:12.132639 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.132747 kubelet[1432]: E0209 09:01:12.132732 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.132984 kubelet[1432]: E0209 09:01:12.132972 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.133048 kubelet[1432]: W0209 09:01:12.133036 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.133136 kubelet[1432]: E0209 09:01:12.133121 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.133405 kubelet[1432]: E0209 09:01:12.133390 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.133542 kubelet[1432]: W0209 09:01:12.133517 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.133684 kubelet[1432]: E0209 09:01:12.133655 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.133953 kubelet[1432]: E0209 09:01:12.133941 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.134039 kubelet[1432]: W0209 09:01:12.134025 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.134277 kubelet[1432]: E0209 09:01:12.134253 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.134461 kubelet[1432]: E0209 09:01:12.134449 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.134630 kubelet[1432]: W0209 09:01:12.134617 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.134745 kubelet[1432]: E0209 09:01:12.134715 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.134927 kubelet[1432]: E0209 09:01:12.134916 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.134991 kubelet[1432]: W0209 09:01:12.134980 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.135079 kubelet[1432]: E0209 09:01:12.135062 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.135300 kubelet[1432]: E0209 09:01:12.135290 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.135369 kubelet[1432]: W0209 09:01:12.135358 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.135457 kubelet[1432]: E0209 09:01:12.135438 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.135781 kubelet[1432]: E0209 09:01:12.135764 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.135886 kubelet[1432]: W0209 09:01:12.135868 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.136022 kubelet[1432]: E0209 09:01:12.136000 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.136281 kubelet[1432]: E0209 09:01:12.136269 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.136356 kubelet[1432]: W0209 09:01:12.136344 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.136457 kubelet[1432]: E0209 09:01:12.136439 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.136717 kubelet[1432]: E0209 09:01:12.136705 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.136798 kubelet[1432]: W0209 09:01:12.136785 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.136883 kubelet[1432]: E0209 09:01:12.136864 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.137130 kubelet[1432]: E0209 09:01:12.137119 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.137202 kubelet[1432]: W0209 09:01:12.137191 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.137299 kubelet[1432]: E0209 09:01:12.137267 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.137545 kubelet[1432]: E0209 09:01:12.137534 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.137610 kubelet[1432]: W0209 09:01:12.137598 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.137728 kubelet[1432]: E0209 09:01:12.137707 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.138019 kubelet[1432]: E0209 09:01:12.138006 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.138122 kubelet[1432]: W0209 09:01:12.138093 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.138273 kubelet[1432]: E0209 09:01:12.138247 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.138580 kubelet[1432]: E0209 09:01:12.138562 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.138675 kubelet[1432]: W0209 09:01:12.138660 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.138774 kubelet[1432]: E0209 09:01:12.138755 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.139034 kubelet[1432]: E0209 09:01:12.139022 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.139128 kubelet[1432]: W0209 09:01:12.139114 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.139228 kubelet[1432]: E0209 09:01:12.139208 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.139473 kubelet[1432]: E0209 09:01:12.139463 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.139569 kubelet[1432]: W0209 09:01:12.139554 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.139674 kubelet[1432]: E0209 09:01:12.139655 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.139905 kubelet[1432]: E0209 09:01:12.139894 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.139984 kubelet[1432]: W0209 09:01:12.139972 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.140080 kubelet[1432]: E0209 09:01:12.140061 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.140329 kubelet[1432]: E0209 09:01:12.140317 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.140412 kubelet[1432]: W0209 09:01:12.140396 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.140537 kubelet[1432]: E0209 09:01:12.140509 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.140815 kubelet[1432]: E0209 09:01:12.140802 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.140894 kubelet[1432]: W0209 09:01:12.140881 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.140985 kubelet[1432]: E0209 09:01:12.140968 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.141241 kubelet[1432]: E0209 09:01:12.141229 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.141329 kubelet[1432]: W0209 09:01:12.141316 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.141435 kubelet[1432]: E0209 09:01:12.141417 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.141686 kubelet[1432]: E0209 09:01:12.141675 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.141770 kubelet[1432]: W0209 09:01:12.141758 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.141855 kubelet[1432]: E0209 09:01:12.141837 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.142083 kubelet[1432]: E0209 09:01:12.142071 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.142185 kubelet[1432]: W0209 09:01:12.142167 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.142315 kubelet[1432]: E0209 09:01:12.142294 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.142596 kubelet[1432]: E0209 09:01:12.142582 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.142684 kubelet[1432]: W0209 09:01:12.142670 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.142896 kubelet[1432]: E0209 09:01:12.142886 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.142969 kubelet[1432]: W0209 09:01:12.142958 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.143110 kubelet[1432]: E0209 09:01:12.142907 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.143159 kubelet[1432]: E0209 09:01:12.143139 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.143305 kubelet[1432]: E0209 09:01:12.143296 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.143363 kubelet[1432]: W0209 09:01:12.143353 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.143622 kubelet[1432]: E0209 09:01:12.143609 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.143698 kubelet[1432]: W0209 09:01:12.143686 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.143933 kubelet[1432]: E0209 09:01:12.143915 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.143987 kubelet[1432]: E0209 09:01:12.143948 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.144052 kubelet[1432]: E0209 09:01:12.144040 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.144129 kubelet[1432]: W0209 09:01:12.144114 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.144237 kubelet[1432]: E0209 09:01:12.144221 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.144425 kubelet[1432]: E0209 09:01:12.144414 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.144541 kubelet[1432]: W0209 09:01:12.144529 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.144641 kubelet[1432]: E0209 09:01:12.144622 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.144871 kubelet[1432]: E0209 09:01:12.144858 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.144956 kubelet[1432]: W0209 09:01:12.144944 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.145208 kubelet[1432]: E0209 09:01:12.145194 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.145280 kubelet[1432]: W0209 09:01:12.145269 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.145518 kubelet[1432]: E0209 09:01:12.145507 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.145597 kubelet[1432]: W0209 09:01:12.145586 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.145847 kubelet[1432]: E0209 09:01:12.145836 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.145933 kubelet[1432]: W0209 09:01:12.145921 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.146198 kubelet[1432]: E0209 09:01:12.146181 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.146290 kubelet[1432]: W0209 09:01:12.146277 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.146593 kubelet[1432]: E0209 09:01:12.146581 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.146682 kubelet[1432]: W0209 09:01:12.146669 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.146898 kubelet[1432]: E0209 09:01:12.146888 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.146977 kubelet[1432]: W0209 09:01:12.146963 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.147202 kubelet[1432]: E0209 09:01:12.147192 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.147267 kubelet[1432]: W0209 09:01:12.147256 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.147515 kubelet[1432]: E0209 09:01:12.147496 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.147601 kubelet[1432]: W0209 09:01:12.147586 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.147822 kubelet[1432]: E0209 09:01:12.147809 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.147920 kubelet[1432]: W0209 09:01:12.147906 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.148161 kubelet[1432]: E0209 09:01:12.148147 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.148246 kubelet[1432]: W0209 09:01:12.148231 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.148328 kubelet[1432]: E0209 09:01:12.148316 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148440 kubelet[1432]: E0209 09:01:12.148428 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148587 kubelet[1432]: E0209 09:01:12.148574 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148686 kubelet[1432]: E0209 09:01:12.148675 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148753 kubelet[1432]: E0209 09:01:12.148743 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148824 kubelet[1432]: E0209 09:01:12.148812 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148900 kubelet[1432]: E0209 09:01:12.148890 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.148968 kubelet[1432]: E0209 09:01:12.148958 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.149042 kubelet[1432]: E0209 09:01:12.149030 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.149127 kubelet[1432]: E0209 09:01:12.149117 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.149205 kubelet[1432]: E0209 09:01:12.149192 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.156768 kubelet[1432]: E0209 09:01:12.156746 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.157003 kubelet[1432]: W0209 09:01:12.156988 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.157108 kubelet[1432]: E0209 09:01:12.157096 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.213921 kubelet[1432]: E0209 09:01:12.210430 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.213921 kubelet[1432]: W0209 09:01:12.213758 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.213921 kubelet[1432]: E0209 09:01:12.213809 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.217937 kubelet[1432]: E0209 09:01:12.217903 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.218287 kubelet[1432]: W0209 09:01:12.218260 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.218435 kubelet[1432]: E0209 09:01:12.218419 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.218880 kubelet[1432]: E0209 09:01:12.218864 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.219006 kubelet[1432]: W0209 09:01:12.218991 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.219103 kubelet[1432]: E0209 09:01:12.219091 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.243906 kubelet[1432]: E0209 09:01:12.243874 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.243906 kubelet[1432]: W0209 09:01:12.243894 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.244085 kubelet[1432]: E0209 09:01:12.243925 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.248262 kubelet[1432]: E0209 09:01:12.248228 1432 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:01:12.248262 kubelet[1432]: W0209 09:01:12.248255 1432 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:01:12.248432 kubelet[1432]: E0209 09:01:12.248279 1432 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:01:12.300323 kubelet[1432]: E0209 09:01:12.300240 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:12.301254 env[1130]: time="2024-02-09T09:01:12.301189225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r8fjp,Uid:c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1,Namespace:kube-system,Attempt:0,}" Feb 9 09:01:12.308799 kubelet[1432]: E0209 09:01:12.308742 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:12.309813 env[1130]: time="2024-02-09T09:01:12.309521998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rw959,Uid:d9995917-cc94-40a8-9341-9a9c8487a0b9,Namespace:calico-system,Attempt:0,}" Feb 9 09:01:12.950929 env[1130]: time="2024-02-09T09:01:12.950872633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.952340 env[1130]: time="2024-02-09T09:01:12.952299146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.955529 env[1130]: time="2024-02-09T09:01:12.955444705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.959092 env[1130]: time="2024-02-09T09:01:12.958996309Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.960154 env[1130]: time="2024-02-09T09:01:12.960053847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.960918 env[1130]: time="2024-02-09T09:01:12.960881304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.968632 env[1130]: time="2024-02-09T09:01:12.968585248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.970512 env[1130]: time="2024-02-09T09:01:12.970446496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:12.982339 kubelet[1432]: E0209 09:01:12.982284 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:13.015275 env[1130]: time="2024-02-09T09:01:13.015167221Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:01:13.015275 env[1130]: time="2024-02-09T09:01:13.015216273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:01:13.015275 env[1130]: time="2024-02-09T09:01:13.015227441Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:01:13.015951 env[1130]: time="2024-02-09T09:01:13.015795683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:01:13.016078 env[1130]: time="2024-02-09T09:01:13.015660015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c pid=1575 runtime=io.containerd.runc.v2 Feb 9 09:01:13.016211 env[1130]: time="2024-02-09T09:01:13.016176462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:01:13.016344 env[1130]: time="2024-02-09T09:01:13.016321797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:01:13.016747 env[1130]: time="2024-02-09T09:01:13.016689421Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6925ea0dff8cea0f0a4b2b74218fbbad73d259011b6add8dff9b6800a69fd459 pid=1574 runtime=io.containerd.runc.v2 Feb 9 09:01:13.042296 systemd[1]: Started cri-containerd-96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c.scope. Feb 9 09:01:13.061970 systemd[1]: Started cri-containerd-6925ea0dff8cea0f0a4b2b74218fbbad73d259011b6add8dff9b6800a69fd459.scope. Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.083784 kernel: audit: type=1400 audit(1707469273.077:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.083929 kernel: audit: type=1400 audit(1707469273.077:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.083960 kernel: audit: type=1400 audit(1707469273.077:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.099549 kernel: audit: type=1400 audit(1707469273.077:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.084000 audit: BPF prog-id=64 op=LOAD Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1575 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383132653832313463613365346365343065343530303732333866 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1575 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383132653832313463613365346365343065343530303732333866 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.105556 kernel: audit: type=1400 audit(1707469273.077:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.093000 audit: BPF prog-id=65 op=LOAD Feb 9 09:01:13.093000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002b7730 items=0 ppid=1575 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383132653832313463613365346365343065343530303732333866 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit: BPF prog-id=66 op=LOAD Feb 9 09:01:13.094000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002b7778 items=0 ppid=1575 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383132653832313463613365346365343065343530303732333866 Feb 9 09:01:13.094000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:01:13.094000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.094000 audit: BPF prog-id=67 op=LOAD Feb 9 09:01:13.094000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002b7b88 items=0 ppid=1575 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936383132653832313463613365346365343065343530303732333866 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.109000 audit: BPF prog-id=68 op=LOAD Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1574 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565613064666638636561306630613462326237343231386662 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1574 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565613064666638636561306630613462326237343231386662 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.112000 audit: BPF prog-id=69 op=LOAD Feb 9 09:01:13.112000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000214e70 items=0 ppid=1574 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565613064666638636561306630613462326237343231386662 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit: BPF prog-id=70 op=LOAD Feb 9 09:01:13.113000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000214eb8 items=0 ppid=1574 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565613064666638636561306630613462326237343231386662 Feb 9 09:01:13.113000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:01:13.113000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:13.113000 audit: BPF prog-id=71 op=LOAD Feb 9 09:01:13.113000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002152c8 items=0 ppid=1574 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:13.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565613064666638636561306630613462326237343231386662 Feb 9 09:01:13.131917 env[1130]: time="2024-02-09T09:01:13.131864928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rw959,Uid:d9995917-cc94-40a8-9341-9a9c8487a0b9,Namespace:calico-system,Attempt:0,} returns sandbox id \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\"" Feb 9 09:01:13.133737 kubelet[1432]: E0209 09:01:13.133403 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:13.135652 env[1130]: time="2024-02-09T09:01:13.135618108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:01:13.138418 env[1130]: time="2024-02-09T09:01:13.138378802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r8fjp,Uid:c0e35e2f-8446-4b0a-b8df-0b8af36d1ce1,Namespace:kube-system,Attempt:0,} returns sandbox id \"6925ea0dff8cea0f0a4b2b74218fbbad73d259011b6add8dff9b6800a69fd459\"" Feb 9 09:01:13.139618 kubelet[1432]: E0209 09:01:13.139587 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:13.155874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount883185886.mount: Deactivated successfully. Feb 9 09:01:13.982986 kubelet[1432]: E0209 09:01:13.982907 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:14.146641 kubelet[1432]: E0209 09:01:14.146578 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:14.875265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4269347085.mount: Deactivated successfully. Feb 9 09:01:14.983615 kubelet[1432]: E0209 09:01:14.983544 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:15.984405 kubelet[1432]: E0209 09:01:15.984333 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:15.997421 env[1130]: time="2024-02-09T09:01:15.997328829Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:16.000627 env[1130]: time="2024-02-09T09:01:16.000561583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:16.004630 env[1130]: time="2024-02-09T09:01:16.004568578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:16.009151 env[1130]: time="2024-02-09T09:01:16.009089152Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:16.010414 env[1130]: time="2024-02-09T09:01:16.010358158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 09:01:16.011686 env[1130]: time="2024-02-09T09:01:16.011649708Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 09:01:16.015174 env[1130]: time="2024-02-09T09:01:16.014963242Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:01:16.031079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount344125736.mount: Deactivated successfully. Feb 9 09:01:16.046523 env[1130]: time="2024-02-09T09:01:16.046428735Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75\"" Feb 9 09:01:16.047469 env[1130]: time="2024-02-09T09:01:16.047424690Z" level=info msg="StartContainer for \"eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75\"" Feb 9 09:01:16.106593 systemd[1]: Started cri-containerd-eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75.scope. Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1575 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:16.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373935303833656366353666323439356630666536386335653566 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit: BPF prog-id=72 op=LOAD Feb 9 09:01:16.139000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000098e00 items=0 ppid=1575 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:16.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373935303833656366353666323439356630666536386335653566 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.139000 audit: BPF prog-id=73 op=LOAD Feb 9 09:01:16.139000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000098e48 items=0 ppid=1575 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:16.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373935303833656366353666323439356630666536386335653566 Feb 9 09:01:16.139000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:01:16.139000 audit: BPF prog-id=72 op=UNLOAD Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { perfmon } for pid=1650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit[1650]: AVC avc: denied { bpf } for pid=1650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:16.140000 audit: BPF prog-id=74 op=LOAD Feb 9 09:01:16.140000 audit[1650]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000098ed8 items=0 ppid=1575 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:16.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373935303833656366353666323439356630666536386335653566 Feb 9 09:01:16.148605 kubelet[1432]: E0209 09:01:16.146771 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:16.181401 env[1130]: time="2024-02-09T09:01:16.181280551Z" level=info msg="StartContainer for \"eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75\" returns successfully" Feb 9 09:01:16.189696 systemd[1]: cri-containerd-eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75.scope: Deactivated successfully. Feb 9 09:01:16.193000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:01:16.231266 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75-rootfs.mount: Deactivated successfully. Feb 9 09:01:16.307285 env[1130]: time="2024-02-09T09:01:16.307223631Z" level=info msg="shim disconnected" id=eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75 Feb 9 09:01:16.307710 env[1130]: time="2024-02-09T09:01:16.307678770Z" level=warning msg="cleaning up after shim disconnected" id=eb795083ecf56f2495f0fe68c5e5ff7a275dc75070e8d7005b10005897483c75 namespace=k8s.io Feb 9 09:01:16.307841 env[1130]: time="2024-02-09T09:01:16.307822868Z" level=info msg="cleaning up dead shim" Feb 9 09:01:16.322233 env[1130]: time="2024-02-09T09:01:16.322173207Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:01:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1690 runtime=io.containerd.runc.v2\n" Feb 9 09:01:16.985170 kubelet[1432]: E0209 09:01:16.985086 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:17.174906 kubelet[1432]: E0209 09:01:17.174863 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:17.349605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1142672293.mount: Deactivated successfully. Feb 9 09:01:17.985949 kubelet[1432]: E0209 09:01:17.985883 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:18.112468 env[1130]: time="2024-02-09T09:01:18.112381578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:18.115199 env[1130]: time="2024-02-09T09:01:18.115136265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:18.117407 env[1130]: time="2024-02-09T09:01:18.117356750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:18.119527 env[1130]: time="2024-02-09T09:01:18.119457169Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:18.119976 env[1130]: time="2024-02-09T09:01:18.119934554Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 09:01:18.121282 env[1130]: time="2024-02-09T09:01:18.121245000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:01:18.122538 env[1130]: time="2024-02-09T09:01:18.122502857Z" level=info msg="CreateContainer within sandbox \"6925ea0dff8cea0f0a4b2b74218fbbad73d259011b6add8dff9b6800a69fd459\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:01:18.139176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3079083860.mount: Deactivated successfully. Feb 9 09:01:18.147060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2610701517.mount: Deactivated successfully. Feb 9 09:01:18.148350 kubelet[1432]: E0209 09:01:18.147841 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:18.156741 env[1130]: time="2024-02-09T09:01:18.156673106Z" level=info msg="CreateContainer within sandbox \"6925ea0dff8cea0f0a4b2b74218fbbad73d259011b6add8dff9b6800a69fd459\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c18429ed9230e1f8749e14789272e3277b60d6f5fa26ff78c71e3b31c3fb9622\"" Feb 9 09:01:18.157666 env[1130]: time="2024-02-09T09:01:18.157629579Z" level=info msg="StartContainer for \"c18429ed9230e1f8749e14789272e3277b60d6f5fa26ff78c71e3b31c3fb9622\"" Feb 9 09:01:18.201782 systemd[1]: Started cri-containerd-c18429ed9230e1f8749e14789272e3277b60d6f5fa26ff78c71e3b31c3fb9622.scope. Feb 9 09:01:18.237000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.239296 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 9 09:01:18.239383 kernel: audit: type=1400 audit(1707469278.237:607): avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.237000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1574 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.246069 kernel: audit: type=1300 audit(1707469278.237:607): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1574 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.246232 kernel: audit: type=1327 audit(1707469278.237:607): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331383432396564393233306531663837343965313437383932373265 Feb 9 09:01:18.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331383432396564393233306531663837343965313437383932373265 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251979 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.252084 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.257532 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.257717 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.262900 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.263061 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.265633 kernel: audit: type=1400 audit(1707469278.238:608): avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.238000 audit: BPF prog-id=75 op=LOAD Feb 9 09:01:18.238000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0ce0 items=0 ppid=1574 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331383432396564393233306531663837343965313437383932373265 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.241000 audit: BPF prog-id=76 op=LOAD Feb 9 09:01:18.241000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0d28 items=0 ppid=1574 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331383432396564393233306531663837343965313437383932373265 Feb 9 09:01:18.251000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:01:18.251000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:18.251000 audit: BPF prog-id=77 op=LOAD Feb 9 09:01:18.251000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0db8 items=0 ppid=1574 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331383432396564393233306531663837343965313437383932373265 Feb 9 09:01:18.294988 env[1130]: time="2024-02-09T09:01:18.294930467Z" level=info msg="StartContainer for \"c18429ed9230e1f8749e14789272e3277b60d6f5fa26ff78c71e3b31c3fb9622\" returns successfully" Feb 9 09:01:18.374000 audit[1767]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.374000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf5556be0 a2=0 a3=7ffcf5556bcc items=0 ppid=1728 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:01:18.379000 audit[1768]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.379000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff57dfd8d0 a2=0 a3=7fff57dfd8bc items=0 ppid=1728 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:01:18.380000 audit[1769]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.380000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe48b10d50 a2=0 a3=7ffe48b10d3c items=0 ppid=1728 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:01:18.382000 audit[1770]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.382000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff75b0e9d0 a2=0 a3=7fff75b0e9bc items=0 ppid=1728 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.382000 audit[1771]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.382000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffd732040 a2=0 a3=7ffffd73202c items=0 ppid=1728 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:01:18.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:01:18.385000 audit[1772]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.385000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe194ba4d0 a2=0 a3=7ffe194ba4bc items=0 ppid=1728 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:01:18.480000 audit[1773]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.480000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd4a07c40 a2=0 a3=7ffcd4a07c2c items=0 ppid=1728 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:01:18.485000 audit[1775]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.485000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdbbd6bcc0 a2=0 a3=7ffdbbd6bcac items=0 ppid=1728 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:01:18.491000 audit[1778]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.491000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe9c607520 a2=0 a3=7ffe9c60750c items=0 ppid=1728 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:01:18.494000 audit[1779]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.494000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea16e95c0 a2=0 a3=7ffea16e95ac items=0 ppid=1728 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:01:18.497000 audit[1781]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.497000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffcf541f0 a2=0 a3=7ffffcf541dc items=0 ppid=1728 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:01:18.499000 audit[1782]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.499000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda9a1d980 a2=0 a3=7ffda9a1d96c items=0 ppid=1728 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:01:18.503000 audit[1784]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.503000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff611f92d0 a2=0 a3=7fff611f92bc items=0 ppid=1728 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:01:18.508000 audit[1787]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.508000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf2c89750 a2=0 a3=7ffcf2c8973c items=0 ppid=1728 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:01:18.510000 audit[1788]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.510000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd6214870 a2=0 a3=7ffdd621485c items=0 ppid=1728 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:01:18.514000 audit[1790]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.514000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef71bcb80 a2=0 a3=7ffef71bcb6c items=0 ppid=1728 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:01:18.516000 audit[1791]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.516000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb1fec2b0 a2=0 a3=7ffcb1fec29c items=0 ppid=1728 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:01:18.521000 audit[1793]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.521000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb4fe5270 a2=0 a3=7ffeb4fe525c items=0 ppid=1728 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:01:18.527000 audit[1796]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.527000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6b9baa50 a2=0 a3=7ffe6b9baa3c items=0 ppid=1728 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:01:18.534000 audit[1799]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.534000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdde1b96a0 a2=0 a3=7ffdde1b968c items=0 ppid=1728 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:01:18.536000 audit[1800]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.536000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7558e590 a2=0 a3=7ffc7558e57c items=0 ppid=1728 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:01:18.542000 audit[1802]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.542000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff5b41ddd0 a2=0 a3=7fff5b41ddbc items=0 ppid=1728 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:01:18.580000 audit[1808]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.580000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe699258a0 a2=0 a3=7ffe6992588c items=0 ppid=1728 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:01:18.590000 audit[1813]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.590000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7853bc60 a2=0 a3=7fff7853bc4c items=0 ppid=1728 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:01:18.594000 audit[1815]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:01:18.594000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee1e6bba0 a2=0 a3=7ffee1e6bb8c items=0 ppid=1728 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:01:18.613000 audit[1817]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:18.613000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd542e4e40 a2=0 a3=7ffd542e4e2c items=0 ppid=1728 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.636000 audit[1817]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:18.636000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd542e4e40 a2=0 a3=7ffd542e4e2c items=0 ppid=1728 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.638000 audit[1823]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.638000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc8c34750 a2=0 a3=7fffc8c3473c items=0 ppid=1728 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:01:18.643000 audit[1825]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.643000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff612adf90 a2=0 a3=7fff612adf7c items=0 ppid=1728 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:01:18.649000 audit[1828]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.649000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd98dab620 a2=0 a3=7ffd98dab60c items=0 ppid=1728 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:01:18.651000 audit[1829]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.651000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8976d640 a2=0 a3=7ffc8976d62c items=0 ppid=1728 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:01:18.655000 audit[1831]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.655000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda0ccc6c0 a2=0 a3=7ffda0ccc6ac items=0 ppid=1728 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:01:18.657000 audit[1832]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.657000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd3b60aa0 a2=0 a3=7fffd3b60a8c items=0 ppid=1728 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:01:18.661000 audit[1834]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.661000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe1c8effa0 a2=0 a3=7ffe1c8eff8c items=0 ppid=1728 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:01:18.667000 audit[1837]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.667000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffca4ce420 a2=0 a3=7fffca4ce40c items=0 ppid=1728 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:01:18.670000 audit[1838]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.670000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75061850 a2=0 a3=7ffd7506183c items=0 ppid=1728 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:01:18.674000 audit[1840]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.674000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff14defd90 a2=0 a3=7fff14defd7c items=0 ppid=1728 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:01:18.678000 audit[1841]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.678000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1ae737e0 a2=0 a3=7fff1ae737cc items=0 ppid=1728 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:01:18.684000 audit[1843]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.684000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd83c7a80 a2=0 a3=7fffd83c7a6c items=0 ppid=1728 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:01:18.691000 audit[1846]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.691000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9b32ad20 a2=0 a3=7ffd9b32ad0c items=0 ppid=1728 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:01:18.698000 audit[1849]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.698000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc6695700 a2=0 a3=7ffdc66956ec items=0 ppid=1728 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:01:18.700000 audit[1850]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.700000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd4299d90 a2=0 a3=7ffcd4299d7c items=0 ppid=1728 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:01:18.709000 audit[1852]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.709000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffddb5c0160 a2=0 a3=7ffddb5c014c items=0 ppid=1728 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:01:18.714000 audit[1855]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.714000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd2ec8c8e0 a2=0 a3=7ffd2ec8c8cc items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:01:18.716000 audit[1856]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.716000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe625a0d80 a2=0 a3=7ffe625a0d6c items=0 ppid=1728 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:01:18.720000 audit[1858]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.720000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9815c550 a2=0 a3=7ffd9815c53c items=0 ppid=1728 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:01:18.726000 audit[1861]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.726000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc88d1b730 a2=0 a3=7ffc88d1b71c items=0 ppid=1728 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:01:18.728000 audit[1862]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.728000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff533b27a0 a2=0 a3=7fff533b278c items=0 ppid=1728 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:01:18.732000 audit[1864]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:01:18.732000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1d01cc00 a2=0 a3=7ffd1d01cbec items=0 ppid=1728 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:01:18.738000 audit[1866]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:01:18.738000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd9d3e0270 a2=0 a3=7ffd9d3e025c items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.738000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.739000 audit[1866]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:01:18.739000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd9d3e0270 a2=0 a3=7ffd9d3e025c items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.739000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.895000 audit[1868]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:18.895000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcea3c4bd0 a2=0 a3=7ffcea3c4bbc items=0 ppid=1728 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.897000 audit[1868]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:18.897000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffcea3c4bd0 a2=0 a3=31030 items=0 ppid=1728 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:18.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:18.986071 kubelet[1432]: E0209 09:01:18.986013 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:19.185184 kubelet[1432]: E0209 09:01:19.184317 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:19.199675 kubelet[1432]: I0209 09:01:19.199614 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-r8fjp" podStartSLOduration=3.21931176 podCreationTimestamp="2024-02-09 09:01:11 +0000 UTC" firstStartedPulling="2024-02-09 09:01:13.140182683 +0000 UTC m=+4.251388098" lastFinishedPulling="2024-02-09 09:01:18.120413438 +0000 UTC m=+9.231618854" observedRunningTime="2024-02-09 09:01:19.199099508 +0000 UTC m=+10.310304945" watchObservedRunningTime="2024-02-09 09:01:19.199542516 +0000 UTC m=+10.310747969" Feb 9 09:01:19.686550 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193757909.mount: Deactivated successfully. Feb 9 09:01:19.888000 audit[1870]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:19.888000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc6242f8a0 a2=0 a3=7ffc6242f88c items=0 ppid=1728 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:19.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:19.891000 audit[1870]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:19.891000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc6242f8a0 a2=0 a3=7ffc6242f88c items=0 ppid=1728 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:19.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:19.987744 kubelet[1432]: E0209 09:01:19.987024 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:20.145855 kubelet[1432]: E0209 09:01:20.145725 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:20.186567 kubelet[1432]: E0209 09:01:20.186524 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:20.987834 kubelet[1432]: E0209 09:01:20.987780 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:21.988993 kubelet[1432]: E0209 09:01:21.988929 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:22.146593 kubelet[1432]: E0209 09:01:22.146547 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:22.907000 audit[1874]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:22.907000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffed54522e0 a2=0 a3=7ffed54522cc items=0 ppid=1728 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:22.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:22.909000 audit[1874]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:22.909000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffed54522e0 a2=0 a3=7ffed54522cc items=0 ppid=1728 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:22.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:22.940000 audit[1876]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:22.940000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdee2abce0 a2=0 a3=7ffdee2abccc items=0 ppid=1728 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:22.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:22.948000 audit[1876]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:22.948000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffdee2abce0 a2=0 a3=7ffdee2abccc items=0 ppid=1728 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:22.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:22.989167 kubelet[1432]: E0209 09:01:22.989129 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:23.482508 env[1130]: time="2024-02-09T09:01:23.482414681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:23.484998 env[1130]: time="2024-02-09T09:01:23.484936163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:23.487986 env[1130]: time="2024-02-09T09:01:23.487928024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:23.490577 env[1130]: time="2024-02-09T09:01:23.490520790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:23.491734 env[1130]: time="2024-02-09T09:01:23.491675589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 09:01:23.495399 env[1130]: time="2024-02-09T09:01:23.495338761Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:01:23.512111 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970059157.mount: Deactivated successfully. Feb 9 09:01:23.522645 env[1130]: time="2024-02-09T09:01:23.522572682Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40\"" Feb 9 09:01:23.524330 env[1130]: time="2024-02-09T09:01:23.524265655Z" level=info msg="StartContainer for \"526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40\"" Feb 9 09:01:23.562261 systemd[1]: run-containerd-runc-k8s.io-526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40-runc.rnoPw7.mount: Deactivated successfully. Feb 9 09:01:23.567136 systemd[1]: Started cri-containerd-526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40.scope. Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.602288 kernel: kauditd_printk_skb: 210 callbacks suppressed Feb 9 09:01:23.602472 kernel: audit: type=1400 audit(1707469283.598:672): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.602552 kernel: audit: type=1300 audit(1707469283.598:672): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1575 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:23.598000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=1575 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:23.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363034316162393838663232653639366564616236653736636361 Feb 9 09:01:23.609247 kernel: audit: type=1327 audit(1707469283.598:672): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363034316162393838663232653639366564616236653736636361 Feb 9 09:01:23.609432 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.612091 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615303 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.617943 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.620194 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.622952 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.598000 audit: BPF prog-id=78 op=LOAD Feb 9 09:01:23.598000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0002ddf10 items=0 ppid=1575 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:23.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363034316162393838663232653639366564616236653736636361 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.629580 kernel: audit: type=1400 audit(1707469283.598:673): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.605000 audit: BPF prog-id=79 op=LOAD Feb 9 09:01:23.605000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0002ddf58 items=0 ppid=1575 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:23.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363034316162393838663232653639366564616236653736636361 Feb 9 09:01:23.615000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:01:23.615000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:23.615000 audit: BPF prog-id=80 op=LOAD Feb 9 09:01:23.615000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0002ddfe8 items=0 ppid=1575 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:23.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363034316162393838663232653639366564616236653736636361 Feb 9 09:01:23.663872 env[1130]: time="2024-02-09T09:01:23.663771796Z" level=info msg="StartContainer for \"526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40\" returns successfully" Feb 9 09:01:23.989766 kubelet[1432]: E0209 09:01:23.989700 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:24.145756 kubelet[1432]: E0209 09:01:24.145709 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:24.195317 kubelet[1432]: E0209 09:01:24.195275 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:24.308017 env[1130]: time="2024-02-09T09:01:24.307779114Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:01:24.310907 systemd[1]: cri-containerd-526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40.scope: Deactivated successfully. Feb 9 09:01:24.314000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:01:24.318774 kubelet[1432]: I0209 09:01:24.318728 1432 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:01:24.508681 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40-rootfs.mount: Deactivated successfully. Feb 9 09:01:24.523570 env[1130]: time="2024-02-09T09:01:24.523515719Z" level=info msg="shim disconnected" id=526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40 Feb 9 09:01:24.524261 env[1130]: time="2024-02-09T09:01:24.524221408Z" level=warning msg="cleaning up after shim disconnected" id=526041ab988f22e696edab6e76cca78bba40b3634df5a7265dd5127f0ea99b40 namespace=k8s.io Feb 9 09:01:24.524423 env[1130]: time="2024-02-09T09:01:24.524400812Z" level=info msg="cleaning up dead shim" Feb 9 09:01:24.534878 env[1130]: time="2024-02-09T09:01:24.534803209Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:01:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1934 runtime=io.containerd.runc.v2\n" Feb 9 09:01:24.990023 kubelet[1432]: E0209 09:01:24.989952 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:25.199011 kubelet[1432]: E0209 09:01:25.198964 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:25.200151 env[1130]: time="2024-02-09T09:01:25.200106421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:01:25.991059 kubelet[1432]: E0209 09:01:25.990986 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:26.152711 systemd[1]: Created slice kubepods-besteffort-pod84c464ab_548d_401b_b871_d64b4077842f.slice. Feb 9 09:01:26.156984 env[1130]: time="2024-02-09T09:01:26.156878429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wd7hh,Uid:84c464ab-548d-401b-b871-d64b4077842f,Namespace:calico-system,Attempt:0,}" Feb 9 09:01:26.236120 env[1130]: time="2024-02-09T09:01:26.236025062Z" level=error msg="Failed to destroy network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:26.239760 env[1130]: time="2024-02-09T09:01:26.238802702Z" level=error msg="encountered an error cleaning up failed sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:26.239760 env[1130]: time="2024-02-09T09:01:26.238877037Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wd7hh,Uid:84c464ab-548d-401b-b871-d64b4077842f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:26.239862 kubelet[1432]: E0209 09:01:26.239117 1432 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:26.239862 kubelet[1432]: E0209 09:01:26.239178 1432 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:26.239862 kubelet[1432]: E0209 09:01:26.239207 1432 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wd7hh" Feb 9 09:01:26.237728 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190-shm.mount: Deactivated successfully. Feb 9 09:01:26.240094 kubelet[1432]: E0209 09:01:26.239272 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wd7hh_calico-system(84c464ab-548d-401b-b871-d64b4077842f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wd7hh_calico-system(84c464ab-548d-401b-b871-d64b4077842f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:26.991922 kubelet[1432]: E0209 09:01:26.991858 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:27.203236 kubelet[1432]: I0209 09:01:27.202797 1432 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:27.203617 env[1130]: time="2024-02-09T09:01:27.203572460Z" level=info msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" Feb 9 09:01:27.281179 env[1130]: time="2024-02-09T09:01:27.281104413Z" level=error msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" failed" error="failed to destroy network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:27.281685 kubelet[1432]: E0209 09:01:27.281527 1432 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:27.281685 kubelet[1432]: E0209 09:01:27.281594 1432 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190} Feb 9 09:01:27.281685 kubelet[1432]: E0209 09:01:27.281634 1432 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84c464ab-548d-401b-b871-d64b4077842f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:01:27.281685 kubelet[1432]: E0209 09:01:27.281661 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84c464ab-548d-401b-b871-d64b4077842f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wd7hh" podUID=84c464ab-548d-401b-b871-d64b4077842f Feb 9 09:01:27.992639 kubelet[1432]: E0209 09:01:27.992585 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:28.992927 kubelet[1432]: E0209 09:01:28.992841 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:29.980890 kubelet[1432]: E0209 09:01:29.980831 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:29.994073 kubelet[1432]: E0209 09:01:29.994021 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:30.265505 kubelet[1432]: I0209 09:01:30.265415 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:01:30.273817 systemd[1]: Created slice kubepods-besteffort-pod30390f17_e0e9_4bd1_8f47_53720ae91843.slice. Feb 9 09:01:30.368118 kubelet[1432]: I0209 09:01:30.368051 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-msz5d\" (UniqueName: \"kubernetes.io/projected/30390f17-e0e9-4bd1-8f47-53720ae91843-kube-api-access-msz5d\") pod \"nginx-deployment-845c78c8b9-kmbwv\" (UID: \"30390f17-e0e9-4bd1-8f47-53720ae91843\") " pod="default/nginx-deployment-845c78c8b9-kmbwv" Feb 9 09:01:30.579960 env[1130]: time="2024-02-09T09:01:30.579809208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kmbwv,Uid:30390f17-e0e9-4bd1-8f47-53720ae91843,Namespace:default,Attempt:0,}" Feb 9 09:01:30.745452 env[1130]: time="2024-02-09T09:01:30.745386190Z" level=error msg="Failed to destroy network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:30.747846 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524-shm.mount: Deactivated successfully. Feb 9 09:01:30.748673 env[1130]: time="2024-02-09T09:01:30.748593831Z" level=error msg="encountered an error cleaning up failed sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:30.748928 env[1130]: time="2024-02-09T09:01:30.748880592Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kmbwv,Uid:30390f17-e0e9-4bd1-8f47-53720ae91843,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:30.749422 kubelet[1432]: E0209 09:01:30.749388 1432 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:30.749578 kubelet[1432]: E0209 09:01:30.749464 1432 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-kmbwv" Feb 9 09:01:30.749578 kubelet[1432]: E0209 09:01:30.749542 1432 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-kmbwv" Feb 9 09:01:30.749692 kubelet[1432]: E0209 09:01:30.749627 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-kmbwv_default(30390f17-e0e9-4bd1-8f47-53720ae91843)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-kmbwv_default(30390f17-e0e9-4bd1-8f47-53720ae91843)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-kmbwv" podUID=30390f17-e0e9-4bd1-8f47-53720ae91843 Feb 9 09:01:30.994450 kubelet[1432]: E0209 09:01:30.994145 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:31.212007 kubelet[1432]: I0209 09:01:31.211945 1432 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:31.212891 env[1130]: time="2024-02-09T09:01:31.212845959Z" level=info msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" Feb 9 09:01:31.282844 env[1130]: time="2024-02-09T09:01:31.282765949Z" level=error msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" failed" error="failed to destroy network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:01:31.283544 kubelet[1432]: E0209 09:01:31.283271 1432 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:31.283544 kubelet[1432]: E0209 09:01:31.283349 1432 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524} Feb 9 09:01:31.283544 kubelet[1432]: E0209 09:01:31.283423 1432 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"30390f17-e0e9-4bd1-8f47-53720ae91843\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:01:31.283544 kubelet[1432]: E0209 09:01:31.283462 1432 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"30390f17-e0e9-4bd1-8f47-53720ae91843\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-kmbwv" podUID=30390f17-e0e9-4bd1-8f47-53720ae91843 Feb 9 09:01:31.994994 kubelet[1432]: E0209 09:01:31.994944 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:32.466195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3575641884.mount: Deactivated successfully. Feb 9 09:01:32.532545 env[1130]: time="2024-02-09T09:01:32.532445281Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:32.535759 env[1130]: time="2024-02-09T09:01:32.535697121Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:32.538512 env[1130]: time="2024-02-09T09:01:32.538443619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:32.541344 env[1130]: time="2024-02-09T09:01:32.541285631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:32.542097 env[1130]: time="2024-02-09T09:01:32.542040263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 09:01:32.563823 env[1130]: time="2024-02-09T09:01:32.563762063Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:01:32.585268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4288523440.mount: Deactivated successfully. Feb 9 09:01:32.594175 env[1130]: time="2024-02-09T09:01:32.594082158Z" level=info msg="CreateContainer within sandbox \"96812e8214ca3e4ce40e45007238fc70bc1d3f8dc2a16e0e8cf388c0c122ef5c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c\"" Feb 9 09:01:32.595233 env[1130]: time="2024-02-09T09:01:32.595170716Z" level=info msg="StartContainer for \"0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c\"" Feb 9 09:01:32.620898 systemd[1]: Started cri-containerd-0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c.scope. Feb 9 09:01:32.657644 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 09:01:32.657825 kernel: audit: type=1400 audit(1707469292.655:679): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.655000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.655000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1575 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:32.665128 kernel: audit: type=1300 audit(1707469292.655:679): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1575 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:32.665318 kernel: audit: type=1327 audit(1707469292.655:679): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306131653164636163303634613039633835636261656331646163 Feb 9 09:01:32.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306131653164636163303634613039633835636261656331646163 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.672682 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.672854 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.678732 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.682736 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.682873 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.690641 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit: BPF prog-id=81 op=LOAD Feb 9 09:01:32.694599 kernel: audit: type=1400 audit(1707469292.657:680): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.657000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039a150 items=0 ppid=1575 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:32.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306131653164636163303634613039633835636261656331646163 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.659000 audit: BPF prog-id=82 op=LOAD Feb 9 09:01:32.659000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039a198 items=0 ppid=1575 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:32.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306131653164636163303634613039633835636261656331646163 Feb 9 09:01:32.669000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:01:32.669000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:32.669000 audit: BPF prog-id=83 op=LOAD Feb 9 09:01:32.669000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039a228 items=0 ppid=1575 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:32.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306131653164636163303634613039633835636261656331646163 Feb 9 09:01:32.715653 env[1130]: time="2024-02-09T09:01:32.715576517Z" level=info msg="StartContainer for \"0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c\" returns successfully" Feb 9 09:01:32.820334 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:01:32.820596 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:01:32.995638 kubelet[1432]: E0209 09:01:32.995551 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:33.220667 kubelet[1432]: E0209 09:01:33.220471 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:33.241021 kubelet[1432]: I0209 09:01:33.240655 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rw959" podStartSLOduration=2.83216703 podCreationTimestamp="2024-02-09 09:01:11 +0000 UTC" firstStartedPulling="2024-02-09 09:01:13.134754696 +0000 UTC m=+4.245960125" lastFinishedPulling="2024-02-09 09:01:32.543187926 +0000 UTC m=+23.654393362" observedRunningTime="2024-02-09 09:01:33.240359495 +0000 UTC m=+24.351564943" watchObservedRunningTime="2024-02-09 09:01:33.240600267 +0000 UTC m=+24.351805703" Feb 9 09:01:33.996261 kubelet[1432]: E0209 09:01:33.996194 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:34.224553 kubelet[1432]: E0209 09:01:34.224504 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:34.268000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=19348 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.268000 audit[2180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebd02e969 a2=241 a3=1b6 items=1 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.268000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:01:34.268000 audit: PATH item=0 name="/dev/fd/63" inode=19342 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.312758 systemd[1]: run-containerd-runc-k8s.io-0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c-runc.wkkDYY.mount: Deactivated successfully. Feb 9 09:01:34.336000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=19983 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.336000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6bb2c979 a2=241 a3=1b6 items=1 ppid=2156 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.336000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:01:34.336000 audit: PATH item=0 name="/dev/fd/63" inode=19366 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.380000 audit[2215]: AVC avc: denied { write } for pid=2215 comm="tee" name="fd" dev="proc" ino=19375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.380000 audit[2215]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd2b8f979 a2=241 a3=1b6 items=1 ppid=2154 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.380000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:01:34.380000 audit: PATH item=0 name="/dev/fd/63" inode=19990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.390000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=19385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.390000 audit[2232]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe752ce979 a2=241 a3=1b6 items=1 ppid=2158 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.390000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:01:34.390000 audit: PATH item=0 name="/dev/fd/63" inode=20000 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.398000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=20012 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.398000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe18d097a a2=241 a3=1b6 items=1 ppid=2170 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.398000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:01:34.398000 audit: PATH item=0 name="/dev/fd/63" inode=19997 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.390000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.415000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=20037 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.419000 audit[2234]: AVC avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=20043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:01:34.419000 audit[2234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc87b4197b a2=241 a3=1b6 items=1 ppid=2173 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.419000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:01:34.419000 audit: PATH item=0 name="/dev/fd/63" inode=20002 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.419000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.415000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8163c96a a2=241 a3=1b6 items=1 ppid=2166 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.415000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:01:34.415000 audit: PATH item=0 name="/dev/fd/63" inode=20006 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:01:34.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:01:34.590520 kernel: Initializing XFRM netlink socket Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.872000 audit: BPF prog-id=84 op=LOAD Feb 9 09:01:34.872000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe45424310 a2=70 a3=7f6d6d6ea000 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.879000 audit: BPF prog-id=84 op=UNLOAD Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.879000 audit: BPF prog-id=85 op=LOAD Feb 9 09:01:34.879000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe45424310 a2=70 a3=6e items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.879000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.880000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe454242c0 a2=70 a3=7ffe45424310 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.880000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.880000 audit: BPF prog-id=86 op=LOAD Feb 9 09:01:34.880000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe454242a0 a2=70 a3=7ffe45424310 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.880000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.881000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:01:34.881000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.881000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe45424380 a2=70 a3=0 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.881000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.881000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.881000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe45424370 a2=70 a3=0 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.881000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.881000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.881000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe454243b0 a2=70 a3=0 items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.881000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.882000 audit: BPF prog-id=87 op=LOAD Feb 9 09:01:34.882000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe454242d0 a2=70 a3=ffffffff items=0 ppid=2157 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.882000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:01:34.889000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.889000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe801430d0 a2=70 a3=fff80800 items=0 ppid=2157 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:01:34.889000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:34.889000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe80142fa0 a2=70 a3=3 items=0 ppid=2157 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:34.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:01:34.896000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:01:34.997539 kubelet[1432]: E0209 09:01:34.997471 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:35.030000 audit[2337]: NETFILTER_CFG table=mangle:73 family=2 entries=19 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:35.030000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff5a11bad0 a2=0 a3=7fff5a11babc items=0 ppid=2157 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:35.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:35.034000 audit[2335]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:35.034000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffaae230b0 a2=0 a3=55beb21ea000 items=0 ppid=2157 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:35.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:35.034000 audit[2336]: NETFILTER_CFG table=nat:75 family=2 entries=16 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:35.034000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffda687d10 a2=0 a3=0 items=0 ppid=2157 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:35.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:35.038000 audit[2338]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:35.038000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffa9ab7da0 a2=0 a3=560d0bb14000 items=0 ppid=2157 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:35.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:35.610283 systemd-networkd[999]: vxlan.calico: Link UP Feb 9 09:01:35.610299 systemd-networkd[999]: vxlan.calico: Gained carrier Feb 9 09:01:35.998333 kubelet[1432]: E0209 09:01:35.998017 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:36.883816 systemd-networkd[999]: vxlan.calico: Gained IPv6LL Feb 9 09:01:36.998734 kubelet[1432]: E0209 09:01:36.998584 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:37.999066 kubelet[1432]: E0209 09:01:37.998984 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:38.999565 kubelet[1432]: E0209 09:01:38.999473 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:39.147077 env[1130]: time="2024-02-09T09:01:39.147013692Z" level=info msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.256 [INFO][2365] k8s.go 578: Cleaning up netns ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.256 [INFO][2365] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" iface="eth0" netns="/var/run/netns/cni-ce2becf9-7146-99ec-432f-e9026f08de48" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.258 [INFO][2365] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" iface="eth0" netns="/var/run/netns/cni-ce2becf9-7146-99ec-432f-e9026f08de48" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.260 [INFO][2365] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" iface="eth0" netns="/var/run/netns/cni-ce2becf9-7146-99ec-432f-e9026f08de48" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.260 [INFO][2365] k8s.go 585: Releasing IP address(es) ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.260 [INFO][2365] utils.go 188: Calico CNI releasing IP address ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.360 [INFO][2371] ipam_plugin.go 415: Releasing address using handleID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.360 [INFO][2371] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.360 [INFO][2371] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.377 [WARNING][2371] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.377 [INFO][2371] ipam_plugin.go 443: Releasing address using workloadID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.380 [INFO][2371] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:01:39.383451 env[1130]: 2024-02-09 09:01:39.381 [INFO][2365] k8s.go 591: Teardown processing complete. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:01:39.387280 env[1130]: time="2024-02-09T09:01:39.386683325Z" level=info msg="TearDown network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" successfully" Feb 9 09:01:39.387280 env[1130]: time="2024-02-09T09:01:39.386736458Z" level=info msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" returns successfully" Feb 9 09:01:39.385902 systemd[1]: run-netns-cni\x2dce2becf9\x2d7146\x2d99ec\x2d432f\x2de9026f08de48.mount: Deactivated successfully. Feb 9 09:01:39.388050 env[1130]: time="2024-02-09T09:01:39.388010019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wd7hh,Uid:84c464ab-548d-401b-b871-d64b4077842f,Namespace:calico-system,Attempt:1,}" Feb 9 09:01:39.653908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:01:39.654061 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6493c719c38: link becomes ready Feb 9 09:01:39.652022 systemd-networkd[999]: cali6493c719c38: Link UP Feb 9 09:01:39.655569 systemd-networkd[999]: cali6493c719c38: Gained carrier Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.488 [INFO][2377] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.227.99.217-k8s-csi--node--driver--wd7hh-eth0 csi-node-driver- calico-system 84c464ab-548d-401b-b871-d64b4077842f 975 0 2024-02-09 09:01:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.227.99.217 csi-node-driver-wd7hh eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6493c719c38 [] []}} ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.488 [INFO][2377] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.534 [INFO][2389] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" HandleID="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.576 [INFO][2389] ipam_plugin.go 268: Auto assigning IP ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" HandleID="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dac0), Attrs:map[string]string{"namespace":"calico-system", "node":"64.227.99.217", "pod":"csi-node-driver-wd7hh", "timestamp":"2024-02-09 09:01:39.534505561 +0000 UTC"}, Hostname:"64.227.99.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.576 [INFO][2389] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.576 [INFO][2389] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.576 [INFO][2389] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.227.99.217' Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.580 [INFO][2389] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.597 [INFO][2389] ipam.go 372: Looking up existing affinities for host host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.608 [INFO][2389] ipam.go 489: Trying affinity for 192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.612 [INFO][2389] ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.616 [INFO][2389] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.616 [INFO][2389] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.621 [INFO][2389] ipam.go 1682: Creating new handle: k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.628 [INFO][2389] ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.643 [INFO][2389] ipam.go 1216: Successfully claimed IPs: [192.168.82.1/26] block=192.168.82.0/26 handle="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.643 [INFO][2389] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.1/26] handle="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" host="64.227.99.217" Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.643 [INFO][2389] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:01:39.683057 env[1130]: 2024-02-09 09:01:39.643 [INFO][2389] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.82.1/26] IPv6=[] ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" HandleID="k8s-pod-network.07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.646 [INFO][2377] k8s.go 385: Populated endpoint ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-csi--node--driver--wd7hh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"84c464ab-548d-401b-b871-d64b4077842f", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"", Pod:"csi-node-driver-wd7hh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6493c719c38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.646 [INFO][2377] k8s.go 386: Calico CNI using IPs: [192.168.82.1/32] ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.647 [INFO][2377] dataplane_linux.go 68: Setting the host side veth name to cali6493c719c38 ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.653 [INFO][2377] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.654 [INFO][2377] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-csi--node--driver--wd7hh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"84c464ab-548d-401b-b871-d64b4077842f", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c", Pod:"csi-node-driver-wd7hh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6493c719c38", MAC:"a2:85:fe:ad:18:48", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:39.684159 env[1130]: 2024-02-09 09:01:39.680 [INFO][2377] k8s.go 491: Wrote updated endpoint to datastore ContainerID="07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c" Namespace="calico-system" Pod="csi-node-driver-wd7hh" WorkloadEndpoint="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:01:39.710263 env[1130]: time="2024-02-09T09:01:39.709539609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:01:39.710263 env[1130]: time="2024-02-09T09:01:39.709607197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:01:39.710263 env[1130]: time="2024-02-09T09:01:39.709624869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:01:39.710825 env[1130]: time="2024-02-09T09:01:39.710761859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c pid=2419 runtime=io.containerd.runc.v2 Feb 9 09:01:39.727000 audit[2436]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:39.751956 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 09:01:39.781751 kernel: audit: type=1325 audit(1707469299.727:710): table=filter:77 family=2 entries=36 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:39.781872 kernel: audit: type=1300 audit(1707469299.727:710): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd369d9f30 a2=0 a3=7ffd369d9f1c items=0 ppid=2157 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.781926 kernel: audit: type=1327 audit(1707469299.727:710): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:39.727000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd369d9f30 a2=0 a3=7ffd369d9f1c items=0 ppid=2157 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.727000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:39.762934 systemd[1]: Started cri-containerd-07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c.scope. Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.811199 kernel: audit: type=1400 audit(1707469299.798:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.811388 kernel: audit: type=1400 audit(1707469299.798:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.811426 kernel: audit: type=1400 audit(1707469299.798:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.831426 kernel: audit: type=1400 audit(1707469299.798:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.834624 kernel: audit: type=1400 audit(1707469299.798:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.840432 kernel: audit: type=1400 audit(1707469299.798:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.893187 kernel: audit: type=1400 audit(1707469299.798:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.798000 audit: BPF prog-id=88 op=LOAD Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303632353939613236393666623738326132336332656334343737 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303632353939613236393666623738326132336332656334343737 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit: BPF prog-id=89 op=LOAD Feb 9 09:01:39.799000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018d1e0 items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303632353939613236393666623738326132336332656334343737 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit: BPF prog-id=90 op=LOAD Feb 9 09:01:39.799000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018d228 items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303632353939613236393666623738326132336332656334343737 Feb 9 09:01:39.799000 audit: BPF prog-id=90 op=UNLOAD Feb 9 09:01:39.799000 audit: BPF prog-id=89 op=UNLOAD Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:39.799000 audit: BPF prog-id=91 op=LOAD Feb 9 09:01:39.799000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018d638 items=0 ppid=2419 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037303632353939613236393666623738326132336332656334343737 Feb 9 09:01:39.921849 env[1130]: time="2024-02-09T09:01:39.917460769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wd7hh,Uid:84c464ab-548d-401b-b871-d64b4077842f,Namespace:calico-system,Attempt:1,} returns sandbox id \"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c\"" Feb 9 09:01:39.925147 env[1130]: time="2024-02-09T09:01:39.925092890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:01:40.001159 kubelet[1432]: E0209 09:01:40.001061 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:41.001319 kubelet[1432]: E0209 09:01:41.001217 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:41.043730 systemd-networkd[999]: cali6493c719c38: Gained IPv6LL Feb 9 09:01:41.761281 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2539949606.mount: Deactivated successfully. Feb 9 09:01:42.002316 kubelet[1432]: E0209 09:01:42.002246 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:42.173191 env[1130]: time="2024-02-09T09:01:42.172657917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:42.175843 env[1130]: time="2024-02-09T09:01:42.175780294Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:42.179307 env[1130]: time="2024-02-09T09:01:42.179118105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:42.181119 env[1130]: time="2024-02-09T09:01:42.181076854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:42.181897 env[1130]: time="2024-02-09T09:01:42.181829598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 09:01:42.185562 env[1130]: time="2024-02-09T09:01:42.185519519Z" level=info msg="CreateContainer within sandbox \"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:01:42.215449 env[1130]: time="2024-02-09T09:01:42.215350596Z" level=info msg="CreateContainer within sandbox \"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d7446ccf3cb4a4564850ff34e2c2f05312cc13d2ebf75550a855012c69434000\"" Feb 9 09:01:42.216520 env[1130]: time="2024-02-09T09:01:42.216457277Z" level=info msg="StartContainer for \"d7446ccf3cb4a4564850ff34e2c2f05312cc13d2ebf75550a855012c69434000\"" Feb 9 09:01:42.247943 systemd[1]: Started cri-containerd-d7446ccf3cb4a4564850ff34e2c2f05312cc13d2ebf75550a855012c69434000.scope. Feb 9 09:01:42.278000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.278000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2419 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:42.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343436636366336362346134353634383530666633346532633266 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit: BPF prog-id=92 op=LOAD Feb 9 09:01:42.279000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b7780 items=0 ppid=2419 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:42.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343436636366336362346134353634383530666633346532633266 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.279000 audit: BPF prog-id=93 op=LOAD Feb 9 09:01:42.279000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b77c8 items=0 ppid=2419 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:42.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343436636366336362346134353634383530666633346532633266 Feb 9 09:01:42.280000 audit: BPF prog-id=93 op=UNLOAD Feb 9 09:01:42.280000 audit: BPF prog-id=92 op=UNLOAD Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:42.280000 audit: BPF prog-id=94 op=LOAD Feb 9 09:01:42.280000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b7858 items=0 ppid=2419 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:42.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437343436636366336362346134353634383530666633346532633266 Feb 9 09:01:42.305787 env[1130]: time="2024-02-09T09:01:42.305735481Z" level=info msg="StartContainer for \"d7446ccf3cb4a4564850ff34e2c2f05312cc13d2ebf75550a855012c69434000\" returns successfully" Feb 9 09:01:42.308004 env[1130]: time="2024-02-09T09:01:42.307938310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 09:01:43.003126 kubelet[1432]: E0209 09:01:43.003043 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:43.146098 env[1130]: time="2024-02-09T09:01:43.145885936Z" level=info msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] k8s.go 578: Cleaning up netns ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" iface="eth0" netns="/var/run/netns/cni-fcf0b7c9-539d-161a-6362-3b80d0872ea6" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" iface="eth0" netns="/var/run/netns/cni-fcf0b7c9-539d-161a-6362-3b80d0872ea6" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" iface="eth0" netns="/var/run/netns/cni-fcf0b7c9-539d-161a-6362-3b80d0872ea6" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] k8s.go 585: Releasing IP address(es) ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.207 [INFO][2507] utils.go 188: Calico CNI releasing IP address ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.229 [INFO][2514] ipam_plugin.go 415: Releasing address using handleID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.230 [INFO][2514] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.230 [INFO][2514] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.241 [WARNING][2514] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.241 [INFO][2514] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.244 [INFO][2514] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:01:43.247206 env[1130]: 2024-02-09 09:01:43.245 [INFO][2507] k8s.go 591: Teardown processing complete. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:01:43.248412 env[1130]: time="2024-02-09T09:01:43.248364855Z" level=info msg="TearDown network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" successfully" Feb 9 09:01:43.248571 env[1130]: time="2024-02-09T09:01:43.248552012Z" level=info msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" returns successfully" Feb 9 09:01:43.250821 systemd[1]: run-netns-cni\x2dfcf0b7c9\x2d539d\x2d161a\x2d6362\x2d3b80d0872ea6.mount: Deactivated successfully. Feb 9 09:01:43.253042 env[1130]: time="2024-02-09T09:01:43.251976527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kmbwv,Uid:30390f17-e0e9-4bd1-8f47-53720ae91843,Namespace:default,Attempt:1,}" Feb 9 09:01:43.462983 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:01:43.463225 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1c0f3cb2148: link becomes ready Feb 9 09:01:43.461316 systemd-networkd[999]: cali1c0f3cb2148: Link UP Feb 9 09:01:43.465303 systemd-networkd[999]: cali1c0f3cb2148: Gained carrier Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.326 [INFO][2520] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0 nginx-deployment-845c78c8b9- default 30390f17-e0e9-4bd1-8f47-53720ae91843 994 0 2024-02-09 09:01:30 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.227.99.217 nginx-deployment-845c78c8b9-kmbwv eth0 default [] [] [kns.default ksa.default.default] cali1c0f3cb2148 [] []}} ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.327 [INFO][2520] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.375 [INFO][2532] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" HandleID="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.388 [INFO][2532] ipam_plugin.go 268: Auto assigning IP ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" HandleID="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024ed90), Attrs:map[string]string{"namespace":"default", "node":"64.227.99.217", "pod":"nginx-deployment-845c78c8b9-kmbwv", "timestamp":"2024-02-09 09:01:43.375256579 +0000 UTC"}, Hostname:"64.227.99.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.389 [INFO][2532] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.389 [INFO][2532] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.389 [INFO][2532] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.227.99.217' Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.393 [INFO][2532] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.404 [INFO][2532] ipam.go 372: Looking up existing affinities for host host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.415 [INFO][2532] ipam.go 489: Trying affinity for 192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.420 [INFO][2532] ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.424 [INFO][2532] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.424 [INFO][2532] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.428 [INFO][2532] ipam.go 1682: Creating new handle: k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663 Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.438 [INFO][2532] ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.449 [INFO][2532] ipam.go 1216: Successfully claimed IPs: [192.168.82.2/26] block=192.168.82.0/26 handle="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.449 [INFO][2532] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.2/26] handle="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" host="64.227.99.217" Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.449 [INFO][2532] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:01:43.479656 env[1130]: 2024-02-09 09:01:43.449 [INFO][2532] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.82.2/26] IPv6=[] ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" HandleID="k8s-pod-network.e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.452 [INFO][2520] k8s.go 385: Populated endpoint ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"30390f17-e0e9-4bd1-8f47-53720ae91843", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-kmbwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c0f3cb2148", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.452 [INFO][2520] k8s.go 386: Calico CNI using IPs: [192.168.82.2/32] ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.453 [INFO][2520] dataplane_linux.go 68: Setting the host side veth name to cali1c0f3cb2148 ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.462 [INFO][2520] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.463 [INFO][2520] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"30390f17-e0e9-4bd1-8f47-53720ae91843", ResourceVersion:"994", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663", Pod:"nginx-deployment-845c78c8b9-kmbwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c0f3cb2148", MAC:"4e:3b:7e:3c:2c:d9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:43.480788 env[1130]: 2024-02-09 09:01:43.472 [INFO][2520] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663" Namespace="default" Pod="nginx-deployment-845c78c8b9-kmbwv" WorkloadEndpoint="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:01:43.507000 audit[2557]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:43.507000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc8f77ca80 a2=0 a3=7ffc8f77ca6c items=0 ppid=2157 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.507000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:43.512167 env[1130]: time="2024-02-09T09:01:43.511970757Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:01:43.512167 env[1130]: time="2024-02-09T09:01:43.512011406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:01:43.512167 env[1130]: time="2024-02-09T09:01:43.512021677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:01:43.512553 env[1130]: time="2024-02-09T09:01:43.512517466Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663 pid=2567 runtime=io.containerd.runc.v2 Feb 9 09:01:43.532887 systemd[1]: Started cri-containerd-e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663.scope. Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.556000 audit: BPF prog-id=95 op=LOAD Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532313139383437373766616163626161613363636638633766326137 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532313139383437373766616163626161613363636638633766326137 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.558000 audit: BPF prog-id=96 op=LOAD Feb 9 09:01:43.558000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dade0 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532313139383437373766616163626161613363636638633766326137 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.559000 audit: BPF prog-id=97 op=LOAD Feb 9 09:01:43.559000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dae28 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532313139383437373766616163626161613363636638633766326137 Feb 9 09:01:43.560000 audit: BPF prog-id=97 op=UNLOAD Feb 9 09:01:43.560000 audit: BPF prog-id=96 op=UNLOAD Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:43.560000 audit: BPF prog-id=98 op=LOAD Feb 9 09:01:43.560000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003db238 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:43.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532313139383437373766616163626161613363636638633766326137 Feb 9 09:01:43.615916 env[1130]: time="2024-02-09T09:01:43.615853623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-kmbwv,Uid:30390f17-e0e9-4bd1-8f47-53720ae91843,Namespace:default,Attempt:1,} returns sandbox id \"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663\"" Feb 9 09:01:44.003842 kubelet[1432]: E0209 09:01:44.003793 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:44.320130 env[1130]: time="2024-02-09T09:01:44.319971401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:44.323546 env[1130]: time="2024-02-09T09:01:44.323288583Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:44.326092 env[1130]: time="2024-02-09T09:01:44.325980386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:44.329389 env[1130]: time="2024-02-09T09:01:44.329303527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:44.331405 env[1130]: time="2024-02-09T09:01:44.331321766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 09:01:44.332643 env[1130]: time="2024-02-09T09:01:44.332602996Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 09:01:44.334125 env[1130]: time="2024-02-09T09:01:44.333910657Z" level=info msg="CreateContainer within sandbox \"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 09:01:44.352531 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount374676273.mount: Deactivated successfully. Feb 9 09:01:44.364574 env[1130]: time="2024-02-09T09:01:44.364442781Z" level=info msg="CreateContainer within sandbox \"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4f36928824a371c84009fbafc8ee26faf51af2e657adbe06fc17727a34ab7f50\"" Feb 9 09:01:44.365177 env[1130]: time="2024-02-09T09:01:44.365140926Z" level=info msg="StartContainer for \"4f36928824a371c84009fbafc8ee26faf51af2e657adbe06fc17727a34ab7f50\"" Feb 9 09:01:44.395133 systemd[1]: Started cri-containerd-4f36928824a371c84009fbafc8ee26faf51af2e657adbe06fc17727a34ab7f50.scope. Feb 9 09:01:44.400036 systemd[1]: run-containerd-runc-k8s.io-4f36928824a371c84009fbafc8ee26faf51af2e657adbe06fc17727a34ab7f50-runc.43iI2k.mount: Deactivated successfully. Feb 9 09:01:44.434000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.434000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2419 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:44.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333639323838323461333731633834303039666261666338656532 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.435000 audit: BPF prog-id=99 op=LOAD Feb 9 09:01:44.435000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d03f0 items=0 ppid=2419 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:44.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333639323838323461333731633834303039666261666338656532 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.436000 audit: BPF prog-id=100 op=LOAD Feb 9 09:01:44.436000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d0438 items=0 ppid=2419 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333639323838323461333731633834303039666261666338656532 Feb 9 09:01:44.438000 audit: BPF prog-id=100 op=UNLOAD Feb 9 09:01:44.438000 audit: BPF prog-id=99 op=UNLOAD Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:44.438000 audit: BPF prog-id=101 op=LOAD Feb 9 09:01:44.438000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d04c8 items=0 ppid=2419 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:44.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333639323838323461333731633834303039666261666338656532 Feb 9 09:01:44.472164 env[1130]: time="2024-02-09T09:01:44.472088498Z" level=info msg="StartContainer for \"4f36928824a371c84009fbafc8ee26faf51af2e657adbe06fc17727a34ab7f50\" returns successfully" Feb 9 09:01:45.004839 kubelet[1432]: E0209 09:01:45.004782 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:45.145615 kubelet[1432]: I0209 09:01:45.145574 1432 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 09:01:45.146608 kubelet[1432]: I0209 09:01:45.146569 1432 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 09:01:45.291057 kubelet[1432]: I0209 09:01:45.290434 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-wd7hh" podStartSLOduration=29.88280766 podCreationTimestamp="2024-02-09 09:01:11 +0000 UTC" firstStartedPulling="2024-02-09 09:01:39.924272047 +0000 UTC m=+31.035477475" lastFinishedPulling="2024-02-09 09:01:44.331830364 +0000 UTC m=+35.443035801" observedRunningTime="2024-02-09 09:01:45.289554197 +0000 UTC m=+36.400759635" watchObservedRunningTime="2024-02-09 09:01:45.290365986 +0000 UTC m=+36.401571422" Feb 9 09:01:45.524423 systemd-networkd[999]: cali1c0f3cb2148: Gained IPv6LL Feb 9 09:01:46.005249 kubelet[1432]: E0209 09:01:46.005166 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:46.922804 update_engine[1097]: I0209 09:01:46.922732 1097 update_attempter.cc:509] Updating boot flags... Feb 9 09:01:47.010633 kubelet[1432]: E0209 09:01:47.008210 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:47.952698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1376404897.mount: Deactivated successfully. Feb 9 09:01:48.009058 kubelet[1432]: E0209 09:01:48.008967 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:49.010081 kubelet[1432]: E0209 09:01:49.009848 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:49.132663 env[1130]: time="2024-02-09T09:01:49.132603057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:49.134665 env[1130]: time="2024-02-09T09:01:49.134614819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:49.137523 env[1130]: time="2024-02-09T09:01:49.137428439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:49.139908 env[1130]: time="2024-02-09T09:01:49.139854869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:01:49.141411 env[1130]: time="2024-02-09T09:01:49.140952155Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 09:01:49.143913 env[1130]: time="2024-02-09T09:01:49.143867636Z" level=info msg="CreateContainer within sandbox \"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 09:01:49.163950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3868166876.mount: Deactivated successfully. Feb 9 09:01:49.173154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2817714620.mount: Deactivated successfully. Feb 9 09:01:49.180438 env[1130]: time="2024-02-09T09:01:49.180364708Z" level=info msg="CreateContainer within sandbox \"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c656d65846d7b9e9a16a0238682770b34d2c2794084ba8f344afe2d1777a57fc\"" Feb 9 09:01:49.181723 env[1130]: time="2024-02-09T09:01:49.181684115Z" level=info msg="StartContainer for \"c656d65846d7b9e9a16a0238682770b34d2c2794084ba8f344afe2d1777a57fc\"" Feb 9 09:01:49.226597 systemd[1]: Started cri-containerd-c656d65846d7b9e9a16a0238682770b34d2c2794084ba8f344afe2d1777a57fc.scope. Feb 9 09:01:49.249533 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 9 09:01:49.249820 kernel: audit: type=1400 audit(1707469309.245:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.260095 kernel: audit: type=1400 audit(1707469309.245:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.302078 kernel: audit: type=1400 audit(1707469309.245:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.302297 kernel: audit: type=1400 audit(1707469309.245:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.307849 kernel: audit: type=1400 audit(1707469309.245:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.308019 kernel: audit: type=1400 audit(1707469309.245:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.316521 kernel: audit: type=1400 audit(1707469309.245:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.327466 kernel: audit: type=1400 audit(1707469309.245:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.327632 kernel: audit: type=1400 audit(1707469309.245:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.246000 audit: BPF prog-id=102 op=LOAD Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2567 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:49.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353664363538343664376239653961313661303233383638323737 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2567 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:49.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353664363538343664376239653961313661303233383638323737 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.332521 kernel: audit: type=1400 audit(1707469309.246:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit: BPF prog-id=103 op=LOAD Feb 9 09:01:49.256000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003999e0 items=0 ppid=2567 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:49.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353664363538343664376239653961313661303233383638323737 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.256000 audit: BPF prog-id=104 op=LOAD Feb 9 09:01:49.256000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000399a28 items=0 ppid=2567 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:49.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353664363538343664376239653961313661303233383638323737 Feb 9 09:01:49.256000 audit: BPF prog-id=104 op=UNLOAD Feb 9 09:01:49.257000 audit: BPF prog-id=103 op=UNLOAD Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:49.257000 audit: BPF prog-id=105 op=LOAD Feb 9 09:01:49.257000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000399e38 items=0 ppid=2567 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336353664363538343664376239653961313661303233383638323737 Feb 9 09:01:49.352605 env[1130]: time="2024-02-09T09:01:49.352524766Z" level=info msg="StartContainer for \"c656d65846d7b9e9a16a0238682770b34d2c2794084ba8f344afe2d1777a57fc\" returns successfully" Feb 9 09:01:49.981081 kubelet[1432]: E0209 09:01:49.981022 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:50.010683 kubelet[1432]: E0209 09:01:50.010613 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:50.329398 kubelet[1432]: I0209 09:01:50.329347 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-kmbwv" podStartSLOduration=14.805618424 podCreationTimestamp="2024-02-09 09:01:30 +0000 UTC" firstStartedPulling="2024-02-09 09:01:43.6181271 +0000 UTC m=+34.729332515" lastFinishedPulling="2024-02-09 09:01:49.141801129 +0000 UTC m=+40.253006548" observedRunningTime="2024-02-09 09:01:50.329150136 +0000 UTC m=+41.440355582" watchObservedRunningTime="2024-02-09 09:01:50.329292457 +0000 UTC m=+41.440497895" Feb 9 09:01:51.010959 kubelet[1432]: E0209 09:01:51.010905 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:52.012291 kubelet[1432]: E0209 09:01:52.012232 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:53.013677 kubelet[1432]: E0209 09:01:53.013617 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:53.144918 systemd[1]: run-containerd-runc-k8s.io-0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c-runc.AApuV1.mount: Deactivated successfully. Feb 9 09:01:53.211946 kubelet[1432]: E0209 09:01:53.211898 1432 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:01:53.495000 audit[2749]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:53.495000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffeaece99c0 a2=0 a3=7ffeaece99ac items=0 ppid=1728 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:53.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:53.496000 audit[2749]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:53.496000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeaece99c0 a2=0 a3=31030 items=0 ppid=1728 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:53.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:53.509000 audit[2751]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:53.509000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe571d9a40 a2=0 a3=7ffe571d9a2c items=0 ppid=1728 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:53.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:53.510000 audit[2751]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:01:53.510000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe571d9a40 a2=0 a3=31030 items=0 ppid=1728 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:53.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:01:53.638358 kubelet[1432]: I0209 09:01:53.638252 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:01:53.644010 systemd[1]: Created slice kubepods-besteffort-podea800c8e_5fa8_49ff_8e56_616401d09911.slice. Feb 9 09:01:53.750235 kubelet[1432]: I0209 09:01:53.749257 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xq8st\" (UniqueName: \"kubernetes.io/projected/ea800c8e-5fa8-49ff-8e56-616401d09911-kube-api-access-xq8st\") pod \"nfs-server-provisioner-0\" (UID: \"ea800c8e-5fa8-49ff-8e56-616401d09911\") " pod="default/nfs-server-provisioner-0" Feb 9 09:01:53.750235 kubelet[1432]: I0209 09:01:53.749434 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ea800c8e-5fa8-49ff-8e56-616401d09911-data\") pod \"nfs-server-provisioner-0\" (UID: \"ea800c8e-5fa8-49ff-8e56-616401d09911\") " pod="default/nfs-server-provisioner-0" Feb 9 09:01:53.948006 env[1130]: time="2024-02-09T09:01:53.947943326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ea800c8e-5fa8-49ff-8e56-616401d09911,Namespace:default,Attempt:0,}" Feb 9 09:01:54.014460 kubelet[1432]: E0209 09:01:54.014381 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:54.190989 systemd-networkd[999]: cali60e51b789ff: Link UP Feb 9 09:01:54.194676 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:01:54.194826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 09:01:54.195380 systemd-networkd[999]: cali60e51b789ff: Gained carrier Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.022 [INFO][2755] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.227.99.217-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ea800c8e-5fa8-49ff-8e56-616401d09911 1056 0 2024-02-09 09:01:53 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 64.227.99.217 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.023 [INFO][2755] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.062 [INFO][2767] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" HandleID="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Workload="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.092 [INFO][2767] ipam_plugin.go 268: Auto assigning IP ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" HandleID="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Workload="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050fd0), Attrs:map[string]string{"namespace":"default", "node":"64.227.99.217", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 09:01:54.062336151 +0000 UTC"}, Hostname:"64.227.99.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.092 [INFO][2767] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.092 [INFO][2767] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.093 [INFO][2767] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.227.99.217' Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.096 [INFO][2767] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.112 [INFO][2767] ipam.go 372: Looking up existing affinities for host host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.142 [INFO][2767] ipam.go 489: Trying affinity for 192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.148 [INFO][2767] ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.152 [INFO][2767] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.152 [INFO][2767] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.159 [INFO][2767] ipam.go 1682: Creating new handle: k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807 Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.165 [INFO][2767] ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.179 [INFO][2767] ipam.go 1216: Successfully claimed IPs: [192.168.82.3/26] block=192.168.82.0/26 handle="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.180 [INFO][2767] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.3/26] handle="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" host="64.227.99.217" Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.180 [INFO][2767] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:01:54.223269 env[1130]: 2024-02-09 09:01:54.180 [INFO][2767] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.82.3/26] IPv6=[] ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" HandleID="k8s-pod-network.565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Workload="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.224106 env[1130]: 2024-02-09 09:01:54.182 [INFO][2755] k8s.go 385: Populated endpoint ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ea800c8e-5fa8-49ff-8e56-616401d09911", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:54.224106 env[1130]: 2024-02-09 09:01:54.182 [INFO][2755] k8s.go 386: Calico CNI using IPs: [192.168.82.3/32] ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.224106 env[1130]: 2024-02-09 09:01:54.183 [INFO][2755] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.224106 env[1130]: 2024-02-09 09:01:54.197 [INFO][2755] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.224348 env[1130]: 2024-02-09 09:01:54.202 [INFO][2755] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ea800c8e-5fa8-49ff-8e56-616401d09911", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"c2:7f:7d:75:bb:c8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:01:54.224348 env[1130]: 2024-02-09 09:01:54.221 [INFO][2755] k8s.go 491: Wrote updated endpoint to datastore ContainerID="565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.227.99.217-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:01:54.260845 env[1130]: time="2024-02-09T09:01:54.260722035Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:01:54.261069 env[1130]: time="2024-02-09T09:01:54.260864998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:01:54.261069 env[1130]: time="2024-02-09T09:01:54.260898784Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:01:54.261274 env[1130]: time="2024-02-09T09:01:54.261196036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807 pid=2798 runtime=io.containerd.runc.v2 Feb 9 09:01:54.268000 audit[2806]: NETFILTER_CFG table=filter:83 family=2 entries=44 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:54.273011 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 09:01:54.273151 kernel: audit: type=1325 audit(1707469314.268:782): table=filter:83 family=2 entries=44 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:01:54.268000 audit[2806]: SYSCALL arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffc15704e60 a2=0 a3=7ffc15704e4c items=0 ppid=2157 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.279556 kernel: audit: type=1300 audit(1707469314.268:782): arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffc15704e60 a2=0 a3=7ffc15704e4c items=0 ppid=2157 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.268000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:54.283616 kernel: audit: type=1327 audit(1707469314.268:782): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:01:54.299320 systemd[1]: run-containerd-runc-k8s.io-565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807-runc.1Vwhmj.mount: Deactivated successfully. Feb 9 09:01:54.304448 systemd[1]: Started cri-containerd-565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807.scope. Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.343779 kernel: audit: type=1400 audit(1707469314.336:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.343974 kernel: audit: type=1400 audit(1707469314.336:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.344022 kernel: audit: type=1400 audit(1707469314.336:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.352182 kernel: audit: type=1400 audit(1707469314.336:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.352370 kernel: audit: type=1400 audit(1707469314.336:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.352416 kernel: audit: type=1400 audit(1707469314.336:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.357703 kernel: audit: type=1400 audit(1707469314.336:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.339000 audit: BPF prog-id=106 op=LOAD Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2798 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356637303037636134613336343538336464313438363665393964 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2798 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356637303037636134613336343538336464313438363665393964 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.345000 audit: BPF prog-id=107 op=LOAD Feb 9 09:01:54.345000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2970 items=0 ppid=2798 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356637303037636134613336343538336464313438363665393964 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.351000 audit: BPF prog-id=108 op=LOAD Feb 9 09:01:54.351000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d29b8 items=0 ppid=2798 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356637303037636134613336343538336464313438363665393964 Feb 9 09:01:54.353000 audit: BPF prog-id=108 op=UNLOAD Feb 9 09:01:54.353000 audit: BPF prog-id=107 op=UNLOAD Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:01:54.353000 audit: BPF prog-id=109 op=LOAD Feb 9 09:01:54.353000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2dc8 items=0 ppid=2798 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:01:54.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356637303037636134613336343538336464313438363665393964 Feb 9 09:01:54.403095 env[1130]: time="2024-02-09T09:01:54.403047820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ea800c8e-5fa8-49ff-8e56-616401d09911,Namespace:default,Attempt:0,} returns sandbox id \"565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807\"" Feb 9 09:01:54.405556 env[1130]: time="2024-02-09T09:01:54.405466475Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 09:01:55.015178 kubelet[1432]: E0209 09:01:55.015116 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:56.016197 kubelet[1432]: E0209 09:01:56.016120 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:56.211709 systemd-networkd[999]: cali60e51b789ff: Gained IPv6LL Feb 9 09:01:57.016533 kubelet[1432]: E0209 09:01:57.016439 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:57.197230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1007657852.mount: Deactivated successfully. Feb 9 09:01:58.017737 kubelet[1432]: E0209 09:01:58.017682 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:01:59.018415 kubelet[1432]: E0209 09:01:59.018347 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:00.019498 kubelet[1432]: E0209 09:02:00.019431 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:00.276730 env[1130]: time="2024-02-09T09:02:00.276575091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:00.283623 env[1130]: time="2024-02-09T09:02:00.283556336Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:00.292427 env[1130]: time="2024-02-09T09:02:00.292349913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:00.301143 env[1130]: time="2024-02-09T09:02:00.301060597Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 09:02:00.304852 env[1130]: time="2024-02-09T09:02:00.304742811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:00.326576 env[1130]: time="2024-02-09T09:02:00.314802305Z" level=info msg="CreateContainer within sandbox \"565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 09:02:00.368240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount872425259.mount: Deactivated successfully. Feb 9 09:02:00.406593 env[1130]: time="2024-02-09T09:02:00.405170342Z" level=info msg="CreateContainer within sandbox \"565f7007ca4a364583dd14866e99d5367706d53241906a15ee8fea1d2f322807\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c222052297bf1e094b433485b0f35150543607c13bc8355089d1111d0ec43f10\"" Feb 9 09:02:00.407213 env[1130]: time="2024-02-09T09:02:00.407156314Z" level=info msg="StartContainer for \"c222052297bf1e094b433485b0f35150543607c13bc8355089d1111d0ec43f10\"" Feb 9 09:02:00.447972 systemd[1]: Started cri-containerd-c222052297bf1e094b433485b0f35150543607c13bc8355089d1111d0ec43f10.scope. Feb 9 09:02:00.480269 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 09:02:00.480452 kernel: audit: type=1400 audit(1707469320.477:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.486719 kernel: audit: type=1400 audit(1707469320.477:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.490095 kernel: audit: type=1400 audit(1707469320.477:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.494642 kernel: audit: type=1400 audit(1707469320.477:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.505687 kernel: audit: type=1400 audit(1707469320.477:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.505889 kernel: audit: type=1400 audit(1707469320.477:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.505931 kernel: audit: type=1400 audit(1707469320.477:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.509276 kernel: audit: type=1400 audit(1707469320.477:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.518119 kernel: audit: type=1400 audit(1707469320.477:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.518298 kernel: audit: type=1400 audit(1707469320.481:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.481000 audit: BPF prog-id=110 op=LOAD Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2798 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:00.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323230353232393762663165303934623433333438356230663335 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2798 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:00.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323230353232393762663165303934623433333438356230663335 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.485000 audit: BPF prog-id=111 op=LOAD Feb 9 09:02:00.485000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025f050 items=0 ppid=2798 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:00.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323230353232393762663165303934623433333438356230663335 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit: BPF prog-id=112 op=LOAD Feb 9 09:02:00.488000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025f098 items=0 ppid=2798 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323230353232393762663165303934623433333438356230663335 Feb 9 09:02:00.488000 audit: BPF prog-id=112 op=UNLOAD Feb 9 09:02:00.488000 audit: BPF prog-id=111 op=UNLOAD Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { perfmon } for pid=2851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit[2851]: AVC avc: denied { bpf } for pid=2851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:00.488000 audit: BPF prog-id=113 op=LOAD Feb 9 09:02:00.488000 audit[2851]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025f4a8 items=0 ppid=2798 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:00.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323230353232393762663165303934623433333438356230663335 Feb 9 09:02:00.559076 env[1130]: time="2024-02-09T09:02:00.558739010Z" level=info msg="StartContainer for \"c222052297bf1e094b433485b0f35150543607c13bc8355089d1111d0ec43f10\" returns successfully" Feb 9 09:02:00.691000 audit[2881]: AVC avc: denied { search } for pid=2881 comm="rpcbind" name="crypto" dev="proc" ino=23928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:02:00.691000 audit[2881]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f238ab680c0 a2=0 a3=0 items=0 ppid=2862 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 key=(null) Feb 9 09:02:00.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 09:02:00.778000 audit[2886]: AVC avc: denied { search } for pid=2886 comm="dbus-daemon" name="crypto" dev="proc" ino=23928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:02:00.778000 audit[2886]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff6227880c0 a2=0 a3=0 items=0 ppid=2862 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 key=(null) Feb 9 09:02:00.778000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 09:02:00.783000 audit[2887]: AVC avc: denied { watch } for pid=2887 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538086 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c594,c992 tclass=dir permissive=0 Feb 9 09:02:00.783000 audit[2887]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55bed49b1970 a2=2c8 a3=7ffdca11b40c items=0 ppid=2862 pid=2887 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 key=(null) Feb 9 09:02:00.783000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 09:02:00.792000 audit[2888]: AVC avc: denied { read } for pid=2888 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23073 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 09:02:00.792000 audit[2888]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6847e74320 a1=80000 a2=d a3=7ffeca64dea0 items=0 ppid=2862 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 key=(null) Feb 9 09:02:00.792000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 09:02:00.794000 audit[2888]: AVC avc: denied { search } for pid=2888 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23928 scontext=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:02:00.794000 audit[2888]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f68473c80c0 a2=0 a3=0 items=0 ppid=2862 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c594,c992 key=(null) Feb 9 09:02:00.794000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 09:02:01.019968 kubelet[1432]: E0209 09:02:01.019890 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:01.427079 kubelet[1432]: I0209 09:02:01.426540 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.529613733 podCreationTimestamp="2024-02-09 09:01:53 +0000 UTC" firstStartedPulling="2024-02-09 09:01:54.405158642 +0000 UTC m=+45.516364072" lastFinishedPulling="2024-02-09 09:02:00.302006375 +0000 UTC m=+51.413211801" observedRunningTime="2024-02-09 09:02:01.426355496 +0000 UTC m=+52.537560945" watchObservedRunningTime="2024-02-09 09:02:01.426461462 +0000 UTC m=+52.537666892" Feb 9 09:02:01.469000 audit[2907]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:01.469000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe7bb45400 a2=0 a3=7ffe7bb453ec items=0 ppid=1728 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:01.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:01.473000 audit[2907]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:01.473000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe7bb45400 a2=0 a3=7ffe7bb453ec items=0 ppid=1728 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:01.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:02.022066 kubelet[1432]: E0209 09:02:02.020620 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:03.021163 kubelet[1432]: E0209 09:02:03.021104 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:04.021635 kubelet[1432]: E0209 09:02:04.021583 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:05.022580 kubelet[1432]: E0209 09:02:05.022505 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:06.022718 kubelet[1432]: E0209 09:02:06.022664 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:07.024064 kubelet[1432]: E0209 09:02:07.024009 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:08.025367 kubelet[1432]: E0209 09:02:08.025310 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:09.026515 kubelet[1432]: E0209 09:02:09.026415 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:09.911601 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 09:02:09.911839 kernel: audit: type=1325 audit(1707469329.906:826): table=filter:86 family=2 entries=9 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.911903 kernel: audit: type=1300 audit(1707469329.906:826): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc2ecbcda0 a2=0 a3=7ffc2ecbcd8c items=0 ppid=1728 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.906000 audit[2913]: NETFILTER_CFG table=filter:86 family=2 entries=9 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.906000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc2ecbcda0 a2=0 a3=7ffc2ecbcd8c items=0 ppid=1728 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.918300 kernel: audit: type=1327 audit(1707469329.906:826): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.918450 kernel: audit: type=1325 audit(1707469329.908:827): table=nat:87 family=2 entries=44 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.908000 audit[2913]: NETFILTER_CFG table=nat:87 family=2 entries=44 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.908000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc2ecbcda0 a2=0 a3=7ffc2ecbcd8c items=0 ppid=1728 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.921313 kubelet[1432]: I0209 09:02:09.921278 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:02:09.924341 kernel: audit: type=1300 audit(1707469329.908:827): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc2ecbcda0 a2=0 a3=7ffc2ecbcd8c items=0 ppid=1728 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.929162 kernel: audit: type=1327 audit(1707469329.908:827): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.936218 systemd[1]: Created slice kubepods-besteffort-podde21071e_7472_497a_ba98_aac420ccb042.slice. Feb 9 09:02:09.943000 audit[2915]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.943000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcd240a690 a2=0 a3=7ffcd240a67c items=0 ppid=1728 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.952110 kernel: audit: type=1325 audit(1707469329.943:828): table=filter:88 family=2 entries=10 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.952270 kernel: audit: type=1300 audit(1707469329.943:828): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcd240a690 a2=0 a3=7ffcd240a67c items=0 ppid=1728 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.952319 kernel: audit: type=1327 audit(1707469329.943:828): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.943000 audit[2915]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.943000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffcd240a690 a2=0 a3=7ffcd240a67c items=0 ppid=1728 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:09.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:09.957605 kernel: audit: type=1325 audit(1707469329.943:829): table=nat:89 family=2 entries=44 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:09.980588 kubelet[1432]: E0209 09:02:09.980521 1432 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:09.991500 env[1130]: time="2024-02-09T09:02:09.991417041Z" level=info msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" Feb 9 09:02:10.026954 kubelet[1432]: E0209 09:02:10.026876 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:10.091391 kubelet[1432]: I0209 09:02:10.091209 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/de21071e-7472-497a-ba98-aac420ccb042-calico-apiserver-certs\") pod \"calico-apiserver-769c9cdcfc-qbrxc\" (UID: \"de21071e-7472-497a-ba98-aac420ccb042\") " pod="calico-apiserver/calico-apiserver-769c9cdcfc-qbrxc" Feb 9 09:02:10.091391 kubelet[1432]: I0209 09:02:10.091293 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dxz7\" (UniqueName: \"kubernetes.io/projected/de21071e-7472-497a-ba98-aac420ccb042-kube-api-access-9dxz7\") pod \"calico-apiserver-769c9cdcfc-qbrxc\" (UID: \"de21071e-7472-497a-ba98-aac420ccb042\") " pod="calico-apiserver/calico-apiserver-769c9cdcfc-qbrxc" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.057 [WARNING][2929] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-csi--node--driver--wd7hh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"84c464ab-548d-401b-b871-d64b4077842f", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c", Pod:"csi-node-driver-wd7hh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6493c719c38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.058 [INFO][2929] k8s.go 578: Cleaning up netns ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.058 [INFO][2929] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" iface="eth0" netns="" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.058 [INFO][2929] k8s.go 585: Releasing IP address(es) ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.058 [INFO][2929] utils.go 188: Calico CNI releasing IP address ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.089 [INFO][2935] ipam_plugin.go 415: Releasing address using handleID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.089 [INFO][2935] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.089 [INFO][2935] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.108 [WARNING][2935] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.108 [INFO][2935] ipam_plugin.go 443: Releasing address using workloadID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.114 [INFO][2935] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:10.120173 env[1130]: 2024-02-09 09:02:10.118 [INFO][2929] k8s.go 591: Teardown processing complete. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.121087 env[1130]: time="2024-02-09T09:02:10.121034066Z" level=info msg="TearDown network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" successfully" Feb 9 09:02:10.121207 env[1130]: time="2024-02-09T09:02:10.121184369Z" level=info msg="StopPodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" returns successfully" Feb 9 09:02:10.122473 env[1130]: time="2024-02-09T09:02:10.122433033Z" level=info msg="RemovePodSandbox for \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" Feb 9 09:02:10.122768 env[1130]: time="2024-02-09T09:02:10.122708098Z" level=info msg="Forcibly stopping sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\"" Feb 9 09:02:10.206225 kubelet[1432]: E0209 09:02:10.203668 1432 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:02:10.206225 kubelet[1432]: E0209 09:02:10.203835 1432 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/de21071e-7472-497a-ba98-aac420ccb042-calico-apiserver-certs podName:de21071e-7472-497a-ba98-aac420ccb042 nodeName:}" failed. No retries permitted until 2024-02-09 09:02:10.703796933 +0000 UTC m=+61.815002377 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/de21071e-7472-497a-ba98-aac420ccb042-calico-apiserver-certs") pod "calico-apiserver-769c9cdcfc-qbrxc" (UID: "de21071e-7472-497a-ba98-aac420ccb042") : secret "calico-apiserver-certs" not found Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.184 [WARNING][2954] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-csi--node--driver--wd7hh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"84c464ab-548d-401b-b871-d64b4077842f", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"07062599a2696fb782a23c2ec44773dcde8a753ed89fdb7b2a7cb86ddcb7757c", Pod:"csi-node-driver-wd7hh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6493c719c38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.184 [INFO][2954] k8s.go 578: Cleaning up netns ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.184 [INFO][2954] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" iface="eth0" netns="" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.185 [INFO][2954] k8s.go 585: Releasing IP address(es) ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.185 [INFO][2954] utils.go 188: Calico CNI releasing IP address ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.224 [INFO][2962] ipam_plugin.go 415: Releasing address using handleID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.225 [INFO][2962] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.225 [INFO][2962] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.238 [WARNING][2962] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.238 [INFO][2962] ipam_plugin.go 443: Releasing address using workloadID ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" HandleID="k8s-pod-network.30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Workload="64.227.99.217-k8s-csi--node--driver--wd7hh-eth0" Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.244 [INFO][2962] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:10.253422 env[1130]: 2024-02-09 09:02:10.251 [INFO][2954] k8s.go 591: Teardown processing complete. ContainerID="30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190" Feb 9 09:02:10.254386 env[1130]: time="2024-02-09T09:02:10.253447767Z" level=info msg="TearDown network for sandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" successfully" Feb 9 09:02:10.258711 env[1130]: time="2024-02-09T09:02:10.258621464Z" level=info msg="RemovePodSandbox \"30a4220cb92c2d52640422a15146a60c52856917297e368444e05aee6b63b190\" returns successfully" Feb 9 09:02:10.259419 env[1130]: time="2024-02-09T09:02:10.259372847Z" level=info msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.339 [WARNING][2982] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"30390f17-e0e9-4bd1-8f47-53720ae91843", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663", Pod:"nginx-deployment-845c78c8b9-kmbwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c0f3cb2148", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.339 [INFO][2982] k8s.go 578: Cleaning up netns ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.339 [INFO][2982] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" iface="eth0" netns="" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.339 [INFO][2982] k8s.go 585: Releasing IP address(es) ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.339 [INFO][2982] utils.go 188: Calico CNI releasing IP address ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.369 [INFO][2988] ipam_plugin.go 415: Releasing address using handleID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.369 [INFO][2988] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.369 [INFO][2988] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.381 [WARNING][2988] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.381 [INFO][2988] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.386 [INFO][2988] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:10.390129 env[1130]: 2024-02-09 09:02:10.388 [INFO][2982] k8s.go 591: Teardown processing complete. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.391135 env[1130]: time="2024-02-09T09:02:10.390131627Z" level=info msg="TearDown network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" successfully" Feb 9 09:02:10.391135 env[1130]: time="2024-02-09T09:02:10.390306024Z" level=info msg="StopPodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" returns successfully" Feb 9 09:02:10.392212 env[1130]: time="2024-02-09T09:02:10.392168460Z" level=info msg="RemovePodSandbox for \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" Feb 9 09:02:10.392514 env[1130]: time="2024-02-09T09:02:10.392416712Z" level=info msg="Forcibly stopping sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\"" Feb 9 09:02:10.404679 kubelet[1432]: I0209 09:02:10.404625 1432 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:02:10.412863 systemd[1]: Created slice kubepods-besteffort-pod7eb008b9_a61c_46a1_b2c4_1b94d029d33c.slice. Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.458 [WARNING][3007] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"30390f17-e0e9-4bd1-8f47-53720ae91843", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"e211984777faacbaaa3ccf8c7f2a74402251dde007f0799df97b1d3ab39a1663", Pod:"nginx-deployment-845c78c8b9-kmbwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c0f3cb2148", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.458 [INFO][3007] k8s.go 578: Cleaning up netns ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.458 [INFO][3007] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" iface="eth0" netns="" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.458 [INFO][3007] k8s.go 585: Releasing IP address(es) ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.458 [INFO][3007] utils.go 188: Calico CNI releasing IP address ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.485 [INFO][3013] ipam_plugin.go 415: Releasing address using handleID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.485 [INFO][3013] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.485 [INFO][3013] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.496 [WARNING][3013] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.496 [INFO][3013] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" HandleID="k8s-pod-network.b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Workload="64.227.99.217-k8s-nginx--deployment--845c78c8b9--kmbwv-eth0" Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.503 [INFO][3013] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:10.506079 env[1130]: 2024-02-09 09:02:10.504 [INFO][3007] k8s.go 591: Teardown processing complete. ContainerID="b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524" Feb 9 09:02:10.506905 env[1130]: time="2024-02-09T09:02:10.506855187Z" level=info msg="TearDown network for sandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" successfully" Feb 9 09:02:10.511016 env[1130]: time="2024-02-09T09:02:10.510957006Z" level=info msg="RemovePodSandbox \"b13bdbe2b112c32b5a27aa4d662b0260d21eb875034de6975a10810031c01524\" returns successfully" Feb 9 09:02:10.597537 kubelet[1432]: I0209 09:02:10.597352 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7fc63dd7-c89b-458e-831b-751774101b65\" (UniqueName: \"kubernetes.io/nfs/7eb008b9-a61c-46a1-b2c4-1b94d029d33c-pvc-7fc63dd7-c89b-458e-831b-751774101b65\") pod \"test-pod-1\" (UID: \"7eb008b9-a61c-46a1-b2c4-1b94d029d33c\") " pod="default/test-pod-1" Feb 9 09:02:10.597971 kubelet[1432]: I0209 09:02:10.597758 1432 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x5brg\" (UniqueName: \"kubernetes.io/projected/7eb008b9-a61c-46a1-b2c4-1b94d029d33c-kube-api-access-x5brg\") pod \"test-pod-1\" (UID: \"7eb008b9-a61c-46a1-b2c4-1b94d029d33c\") " pod="default/test-pod-1" Feb 9 09:02:10.731000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.736585 kernel: Failed to create system directory netfs Feb 9 09:02:10.731000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.737573 kernel: Failed to create system directory netfs Feb 9 09:02:10.731000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.739346 kernel: Failed to create system directory netfs Feb 9 09:02:10.739429 kernel: Failed to create system directory netfs Feb 9 09:02:10.731000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.731000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55abd86575e0 a1=153bc a2=55abd7b1b2b0 a3=5 items=0 ppid=475 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:10.731000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.753752 kernel: Failed to create system directory fscache Feb 9 09:02:10.754067 kernel: Failed to create system directory fscache Feb 9 09:02:10.754113 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.756124 kernel: Failed to create system directory fscache Feb 9 09:02:10.756248 kernel: Failed to create system directory fscache Feb 9 09:02:10.756281 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.758050 kernel: Failed to create system directory fscache Feb 9 09:02:10.758173 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.759533 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.761271 kernel: Failed to create system directory fscache Feb 9 09:02:10.761359 kernel: Failed to create system directory fscache Feb 9 09:02:10.761395 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.762746 kernel: Failed to create system directory fscache Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.747000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.764330 kernel: Failed to create system directory fscache Feb 9 09:02:10.767027 kernel: FS-Cache: Loaded Feb 9 09:02:10.747000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55abd886c9c0 a1=4c0fc a2=55abd7b1b2b0 a3=5 items=0 ppid=475 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:10.747000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.816172 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.816266 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.816298 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.817665 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.817763 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.819103 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.820232 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.820320 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.821698 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.821995 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.822561 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.823923 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.823985 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.826022 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.826093 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.826115 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.826847 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.827574 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.829078 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.829188 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.829765 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.831086 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.831168 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.832605 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.832702 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.834097 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.834190 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.834792 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.846014 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.847766 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.848123 env[1130]: time="2024-02-09T09:02:10.848068292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-769c9cdcfc-qbrxc,Uid:de21071e-7472-497a-ba98-aac420ccb042,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:02:10.848615 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.850864 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.851836 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.852751 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.854464 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.854564 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.856591 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.856709 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.860235 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.860316 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.861091 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.870976 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.872321 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.873182 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.874632 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.874726 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.878003 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.878118 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.878210 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.879910 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.880968 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.881074 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.882858 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.882958 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.894292 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894414 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894472 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894518 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894543 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894571 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.894596 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.895343 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.897172 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.897255 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.899212 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.902245 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.903607 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.903714 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.905356 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.905463 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.906912 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.906983 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.908718 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.908829 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.910328 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.910445 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.910954 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.913047 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.913138 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.913161 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.915125 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.915195 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.915312 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.917220 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.917316 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.917344 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.918989 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.919088 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.921346 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.921415 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.921442 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.922325 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.924139 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.924220 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.926264 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.926381 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.927827 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.927927 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.930383 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.930458 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.930477 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.934279 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.934465 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.938146 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.938342 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.942520 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.943027 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.946670 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.946808 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.949422 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.949654 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.951716 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.951805 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.954001 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.954103 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.955964 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.956035 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.958220 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.958295 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.959260 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.960473 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.963919 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.964031 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.964062 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.966163 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.966262 kernel: Failed to create system directory sunrpc Feb 9 09:02:10.790000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:10.980495 kernel: RPC: Registered named UNIX socket transport module. Feb 9 09:02:10.980651 kernel: RPC: Registered udp transport module. Feb 9 09:02:10.980699 kernel: RPC: Registered tcp transport module. Feb 9 09:02:10.981558 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 09:02:10.790000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55abd88b8ad0 a1=1588c4 a2=55abd7b1b2b0 a3=5 items=6 ppid=475 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:10.790000 audit: CWD cwd="/" Feb 9 09:02:10.790000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PATH item=1 name=(null) inode=23446 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PATH item=2 name=(null) inode=23446 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PATH item=3 name=(null) inode=23447 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PATH item=4 name=(null) inode=23446 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PATH item=5 name=(null) inode=23448 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:02:10.790000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.029840 kernel: Failed to create system directory nfs Feb 9 09:02:11.030038 kernel: Failed to create system directory nfs Feb 9 09:02:11.030082 kernel: Failed to create system directory nfs Feb 9 09:02:11.030102 kernel: Failed to create system directory nfs Feb 9 09:02:11.030120 kernel: Failed to create system directory nfs Feb 9 09:02:11.030138 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.030379 kubelet[1432]: E0209 09:02:11.029724 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:11.030952 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.032006 kernel: Failed to create system directory nfs Feb 9 09:02:11.032084 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.033559 kernel: Failed to create system directory nfs Feb 9 09:02:11.033615 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.034971 kernel: Failed to create system directory nfs Feb 9 09:02:11.035045 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.037196 kernel: Failed to create system directory nfs Feb 9 09:02:11.037302 kernel: Failed to create system directory nfs Feb 9 09:02:11.037341 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.038820 kernel: Failed to create system directory nfs Feb 9 09:02:11.038886 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.039601 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.040997 kernel: Failed to create system directory nfs Feb 9 09:02:11.041070 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.043129 kernel: Failed to create system directory nfs Feb 9 09:02:11.043306 kernel: Failed to create system directory nfs Feb 9 09:02:11.043349 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.044572 kernel: Failed to create system directory nfs Feb 9 09:02:11.044637 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.046115 kernel: Failed to create system directory nfs Feb 9 09:02:11.046181 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.047969 kernel: Failed to create system directory nfs Feb 9 09:02:11.048045 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.049608 kernel: Failed to create system directory nfs Feb 9 09:02:11.049712 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.051176 kernel: Failed to create system directory nfs Feb 9 09:02:11.051260 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.051965 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.054272 kernel: Failed to create system directory nfs Feb 9 09:02:11.054384 kernel: Failed to create system directory nfs Feb 9 09:02:11.054416 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.056001 kernel: Failed to create system directory nfs Feb 9 09:02:11.056197 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.057139 kernel: Failed to create system directory nfs Feb 9 09:02:11.057210 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.058036 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.059143 kernel: Failed to create system directory nfs Feb 9 09:02:11.059221 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.059870 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.060622 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.061940 kernel: Failed to create system directory nfs Feb 9 09:02:11.062020 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.062585 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.063874 kernel: Failed to create system directory nfs Feb 9 09:02:11.063944 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.064578 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.066188 kernel: Failed to create system directory nfs Feb 9 09:02:11.066276 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.068182 kernel: Failed to create system directory nfs Feb 9 09:02:11.068263 kernel: Failed to create system directory nfs Feb 9 09:02:11.068293 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.014000 audit[3022]: AVC avc: denied { confidentiality } for pid=3022 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.069898 kernel: Failed to create system directory nfs Feb 9 09:02:11.014000 audit[3022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55abd8a5b680 a1=e29dc a2=55abd7b1b2b0 a3=5 items=0 ppid=475 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.014000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:02:11.084663 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 09:02:11.128185 systemd-networkd[999]: calie7817c71202: Link UP Feb 9 09:02:11.132476 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:02:11.132601 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7817c71202: link becomes ready Feb 9 09:02:11.132200 systemd-networkd[999]: calie7817c71202: Gained carrier Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.136200 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.136553 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.136711 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.137136 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.137967 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.138758 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.140478 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.140585 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.141447 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.142335 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.143237 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.144012 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.147097 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.147208 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.147233 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.147250 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.147653 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.149218 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.150876 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.151072 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.155394 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.155449 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.155467 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.155532 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.158513 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.158606 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:10.982 [INFO][3025] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0 calico-apiserver-769c9cdcfc- calico-apiserver de21071e-7472-497a-ba98-aac420ccb042 1157 0 2024-02-09 09:02:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:769c9cdcfc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 64.227.99.217 calico-apiserver-769c9cdcfc-qbrxc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie7817c71202 [] []}} ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:10.982 [INFO][3025] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.047 [INFO][3038] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" HandleID="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Workload="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.076 [INFO][3038] ipam_plugin.go 268: Auto assigning IP ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" HandleID="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Workload="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f14b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"64.227.99.217", "pod":"calico-apiserver-769c9cdcfc-qbrxc", "timestamp":"2024-02-09 09:02:11.047875208 +0000 UTC"}, Hostname:"64.227.99.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.076 [INFO][3038] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.076 [INFO][3038] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.076 [INFO][3038] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.227.99.217' Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.079 [INFO][3038] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.086 [INFO][3038] ipam.go 372: Looking up existing affinities for host host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.095 [INFO][3038] ipam.go 489: Trying affinity for 192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.098 [INFO][3038] ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.103 [INFO][3038] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.103 [INFO][3038] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.106 [INFO][3038] ipam.go 1682: Creating new handle: k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.111 [INFO][3038] ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.118 [INFO][3038] ipam.go 1216: Successfully claimed IPs: [192.168.82.4/26] block=192.168.82.0/26 handle="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.118 [INFO][3038] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.4/26] handle="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" host="64.227.99.217" Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.118 [INFO][3038] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:11.166498 env[1130]: 2024-02-09 09:02:11.118 [INFO][3038] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.82.4/26] IPv6=[] ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" HandleID="k8s-pod-network.7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Workload="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.120 [INFO][3025] k8s.go 385: Populated endpoint ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0", GenerateName:"calico-apiserver-769c9cdcfc-", Namespace:"calico-apiserver", SelfLink:"", UID:"de21071e-7472-497a-ba98-aac420ccb042", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 2, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"769c9cdcfc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"", Pod:"calico-apiserver-769c9cdcfc-qbrxc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie7817c71202", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.120 [INFO][3025] k8s.go 386: Calico CNI using IPs: [192.168.82.4/32] ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.120 [INFO][3025] dataplane_linux.go 68: Setting the host side veth name to calie7817c71202 ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.133 [INFO][3025] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.134 [INFO][3025] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0", GenerateName:"calico-apiserver-769c9cdcfc-", Namespace:"calico-apiserver", SelfLink:"", UID:"de21071e-7472-497a-ba98-aac420ccb042", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 2, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"769c9cdcfc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d", Pod:"calico-apiserver-769c9cdcfc-qbrxc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie7817c71202", MAC:"9a:b4:5b:70:0b:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:11.167508 env[1130]: 2024-02-09 09:02:11.160 [INFO][3025] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d" Namespace="calico-apiserver" Pod="calico-apiserver-769c9cdcfc-qbrxc" WorkloadEndpoint="64.227.99.217-k8s-calico--apiserver--769c9cdcfc--qbrxc-eth0" Feb 9 09:02:11.168639 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.168733 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.168754 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.173290 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.173372 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.174395 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.175579 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.177662 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.177748 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.177776 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.181533 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.181705 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.185621 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.191098 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.191220 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.191250 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.192609 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.192712 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.194050 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.194149 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.196041 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.196148 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.201073 env[1130]: time="2024-02-09T09:02:11.200977026Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:02:11.201073 env[1130]: time="2024-02-09T09:02:11.201020293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:02:11.201073 env[1130]: time="2024-02-09T09:02:11.201031199Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:02:11.201318 env[1130]: time="2024-02-09T09:02:11.201260108Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d pid=3070 runtime=io.containerd.runc.v2 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.205328 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.205442 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.205497 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.205544 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.206713 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.206789 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.208131 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.208208 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.208685 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.210099 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.210177 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.212009 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.212105 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.212134 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.215627 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.220013 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.231513 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231626 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231659 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231676 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231692 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231716 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.231733 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.224000 audit[3081]: NETFILTER_CFG table=filter:90 family=2 entries=51 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.224000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=26900 a0=3 a1=7ffeabd984b0 a2=0 a3=7ffeabd9849c items=0 ppid=2157 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.224000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.238518 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238665 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238685 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238705 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238721 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238737 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238753 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238779 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.238795 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.239976 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.240871 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.241710 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.242737 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.243685 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.244575 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.245545 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.246503 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.248533 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.248609 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.250117 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.252678 systemd[1]: Started cri-containerd-7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d.scope. Feb 9 09:02:11.261028 systemd[1]: run-containerd-runc-k8s.io-7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d-runc.MuH7SD.mount: Deactivated successfully. Feb 9 09:02:11.273933 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.274067 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.274087 kernel: Failed to create system directory nfs4 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.114000 audit[3045]: AVC avc: denied { confidentiality } for pid=3045 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.302000 audit: BPF prog-id=114 op=LOAD Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023fc48 a2=10 a3=1c items=0 ppid=3070 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761623632343964626131653466366466356437313037636636383033 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023f6b0 a2=3c a3=c items=0 ppid=3070 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761623632343964626131653466366466356437313037636636383033 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit: BPF prog-id=115 op=LOAD Feb 9 09:02:11.306000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023f9d8 a2=78 a3=c0002ca430 items=0 ppid=3070 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761623632343964626131653466366466356437313037636636383033 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.306000 audit: BPF prog-id=116 op=LOAD Feb 9 09:02:11.306000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023f770 a2=78 a3=c0002ca478 items=0 ppid=3070 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761623632343964626131653466366466356437313037636636383033 Feb 9 09:02:11.306000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:02:11.306000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { perfmon } for pid=3080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit[3080]: AVC avc: denied { bpf } for pid=3080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:11.307000 audit: BPF prog-id=117 op=LOAD Feb 9 09:02:11.307000 audit[3080]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023fc30 a2=78 a3=c0002ca888 items=0 ppid=3070 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761623632343964626131653466366466356437313037636636383033 Feb 9 09:02:11.373632 env[1130]: time="2024-02-09T09:02:11.373572882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-769c9cdcfc-qbrxc,Uid:de21071e-7472-497a-ba98-aac420ccb042,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d\"" Feb 9 09:02:11.378230 env[1130]: time="2024-02-09T09:02:11.378175300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:02:11.453848 kernel: NFS: Registering the id_resolver key type Feb 9 09:02:11.454017 kernel: Key type id_resolver registered Feb 9 09:02:11.454049 kernel: Key type id_legacy registered Feb 9 09:02:11.114000 audit[3045]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f60e0418010 a1=1d3cc4 a2=564df9e542b0 a3=5 items=0 ppid=475 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.114000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.479720 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.481865 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.482020 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.483032 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.484108 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.485200 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.486383 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.487563 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.488595 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.489601 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.491614 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.491688 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.492635 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.493737 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.494736 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.495752 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.496827 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.497924 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.498938 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.500171 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.501303 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.502331 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.503594 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.505588 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.505665 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.506611 kernel: Failed to create system directory rpcgss Feb 9 09:02:11.472000 audit[3105]: AVC avc: denied { confidentiality } for pid=3105 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:02:11.472000 audit[3105]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f098e31c010 a1=4f524 a2=55616fae72b0 a3=5 items=0 ppid=475 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:11.472000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 09:02:12.030910 kubelet[1432]: E0209 09:02:12.030852 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:12.531867 systemd-networkd[999]: calie7817c71202: Gained IPv6LL Feb 9 09:02:12.952933 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3490042457.mount: Deactivated successfully. Feb 9 09:02:13.031880 kubelet[1432]: E0209 09:02:13.031792 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:14.032028 kubelet[1432]: E0209 09:02:14.031967 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:15.033092 kubelet[1432]: E0209 09:02:15.033043 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:15.705996 env[1130]: time="2024-02-09T09:02:15.705792813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:15.708272 env[1130]: time="2024-02-09T09:02:15.708210924Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:15.711461 env[1130]: time="2024-02-09T09:02:15.711381040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:15.713703 env[1130]: time="2024-02-09T09:02:15.713649595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:15.714922 env[1130]: time="2024-02-09T09:02:15.714866684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 09:02:15.718340 env[1130]: time="2024-02-09T09:02:15.718269907Z" level=info msg="CreateContainer within sandbox \"7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:02:15.734067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3827566305.mount: Deactivated successfully. Feb 9 09:02:15.742337 env[1130]: time="2024-02-09T09:02:15.742268223Z" level=info msg="CreateContainer within sandbox \"7ab6249dba1e4f6df5d7107cf680343c8f15113609025e280c9d46d358510a3d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"69fb24c75ea0884f84770cb22985386d52e98a67c7e0786d96ec37bc685f3dd3\"" Feb 9 09:02:15.743916 env[1130]: time="2024-02-09T09:02:15.743869691Z" level=info msg="StartContainer for \"69fb24c75ea0884f84770cb22985386d52e98a67c7e0786d96ec37bc685f3dd3\"" Feb 9 09:02:15.767224 systemd[1]: Started cri-containerd-69fb24c75ea0884f84770cb22985386d52e98a67c7e0786d96ec37bc685f3dd3.scope. Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.793089 kernel: kauditd_printk_skb: 404 callbacks suppressed Feb 9 09:02:15.793217 kernel: audit: type=1400 audit(1707469335.790:855): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.798394 kernel: audit: type=1400 audit(1707469335.790:856): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.798569 kernel: audit: type=1400 audit(1707469335.790:857): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.805260 kernel: audit: type=1400 audit(1707469335.790:858): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.805402 kernel: audit: type=1400 audit(1707469335.790:859): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.805451 kernel: audit: type=1400 audit(1707469335.790:860): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.810445 kernel: audit: type=1400 audit(1707469335.790:861): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.810629 kernel: audit: type=1400 audit(1707469335.790:862): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.813545 kernel: audit: type=1400 audit(1707469335.790:863): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.819665 kernel: audit: type=1400 audit(1707469335.790:864): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit: BPF prog-id=118 op=LOAD Feb 9 09:02:15.790000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3070 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:15.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639666232346337356561303838346638343737306362323239383533 Feb 9 09:02:15.790000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.790000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3070 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:15.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639666232346337356561303838346638343737306362323239383533 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.792000 audit: BPF prog-id=119 op=LOAD Feb 9 09:02:15.792000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021bad0 items=0 ppid=3070 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:15.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639666232346337356561303838346638343737306362323239383533 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.799000 audit: BPF prog-id=120 op=LOAD Feb 9 09:02:15.799000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021bb18 items=0 ppid=3070 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:15.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639666232346337356561303838346638343737306362323239383533 Feb 9 09:02:15.806000 audit: BPF prog-id=120 op=UNLOAD Feb 9 09:02:15.806000 audit: BPF prog-id=119 op=UNLOAD Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:15.806000 audit: BPF prog-id=121 op=LOAD Feb 9 09:02:15.806000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021bf28 items=0 ppid=3070 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:15.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639666232346337356561303838346638343737306362323239383533 Feb 9 09:02:15.863181 env[1130]: time="2024-02-09T09:02:15.863102287Z" level=info msg="StartContainer for \"69fb24c75ea0884f84770cb22985386d52e98a67c7e0786d96ec37bc685f3dd3\" returns successfully" Feb 9 09:02:16.033621 kubelet[1432]: E0209 09:02:16.033541 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:16.481000 audit[3159]: NETFILTER_CFG table=filter:91 family=2 entries=10 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:16.481000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe9b702f50 a2=0 a3=7ffe9b702f3c items=0 ppid=1728 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:16.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:16.484000 audit[3159]: NETFILTER_CFG table=nat:92 family=2 entries=44 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:16.484000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe9b702f50 a2=0 a3=7ffe9b702f3c items=0 ppid=1728 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:16.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:16.594963 systemd[1]: Started sshd@7-64.227.99.217:22-167.172.182.99:50990.service. Feb 9 09:02:16.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-64.227.99.217:22-167.172.182.99:50990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:02:16.976000 audit[3137]: AVC avc: denied { watch } for pid=3137 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_02_10.319090152/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c724,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c724,c738 tclass=file permissive=0 Feb 9 09:02:16.976000 audit[3137]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b94320 a2=fc6 a3=0 items=0 ppid=3070 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c724,c738 key=(null) Feb 9 09:02:16.976000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:02:17.034721 kubelet[1432]: E0209 09:02:17.034617 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:17.436230 sshd[3161]: Invalid user golshan from 167.172.182.99 port 50990 Feb 9 09:02:17.441127 sshd[3161]: pam_faillock(sshd:auth): User unknown Feb 9 09:02:17.443536 sshd[3161]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:02:17.443834 sshd[3161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.182.99 Feb 9 09:02:17.444889 sshd[3161]: pam_faillock(sshd:auth): User unknown Feb 9 09:02:17.443000 audit[3161]: USER_AUTH pid=3161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="golshan" exe="/usr/sbin/sshd" hostname=167.172.182.99 addr=167.172.182.99 terminal=ssh res=failed' Feb 9 09:02:17.528998 nfsidmap[3110]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-5-babd43ad13' Feb 9 09:02:18.035573 kubelet[1432]: E0209 09:02:18.035476 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:19.036529 kubelet[1432]: E0209 09:02:19.036460 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:19.101000 audit[3168]: NETFILTER_CFG table=filter:93 family=2 entries=10 op=nft_register_rule pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:19.101000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffc6fe1b50 a2=0 a3=7fffc6fe1b3c items=0 ppid=1728 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:19.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:19.104000 audit[3168]: NETFILTER_CFG table=nat:94 family=2 entries=44 op=nft_register_rule pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:02:19.104000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fffc6fe1b50 a2=0 a3=7fffc6fe1b3c items=0 ppid=1728 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:19.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:02:19.318158 sshd[3161]: Failed password for invalid user golshan from 167.172.182.99 port 50990 ssh2 Feb 9 09:02:20.037650 kubelet[1432]: E0209 09:02:20.037560 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:20.175457 sshd[3161]: Received disconnect from 167.172.182.99 port 50990:11: Bye Bye [preauth] Feb 9 09:02:20.175457 sshd[3161]: Disconnected from invalid user golshan 167.172.182.99 port 50990 [preauth] Feb 9 09:02:20.177305 systemd[1]: sshd@7-64.227.99.217:22-167.172.182.99:50990.service: Deactivated successfully. Feb 9 09:02:20.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-64.227.99.217:22-167.172.182.99:50990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:02:21.038301 kubelet[1432]: E0209 09:02:21.038243 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:22.039108 kubelet[1432]: E0209 09:02:22.039044 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:23.040133 kubelet[1432]: E0209 09:02:23.040065 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:23.159532 systemd[1]: run-containerd-runc-k8s.io-0e0a1e1dcac064a09c85cbaec1dacf5254624b49e8c7a9c401df56659ff0032c-runc.8XNXiF.mount: Deactivated successfully. Feb 9 09:02:23.669311 nfsidmap[3164]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-5-babd43ad13' Feb 9 09:02:23.701000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.704204 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 09:02:23.704362 kernel: audit: type=1400 audit(1707469343.701:881): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.701000 audit[1177]: AVC avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.711198 kernel: audit: type=1400 audit(1707469343.701:882): avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.711352 kernel: audit: type=1300 audit(1707469343.701:882): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556654db16c0 a2=10 a3=9d710965312ffd98 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:23.701000 audit[1177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556654db16c0 a2=10 a3=9d710965312ffd98 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:23.701000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:02:23.717350 kernel: audit: type=1327 audit(1707469343.701:882): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:02:23.717595 kernel: audit: type=1400 audit(1707469343.701:883): avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.701000 audit[1177]: AVC avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.720541 kernel: audit: type=1300 audit(1707469343.701:883): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556654db16c0 a2=10 a3=9d710965312ffd98 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:23.701000 audit[1177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556654db16c0 a2=10 a3=9d710965312ffd98 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:23.725107 kernel: audit: type=1327 audit(1707469343.701:883): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:02:23.701000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:02:23.704000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.729970 kernel: audit: type=1400 audit(1707469343.704:884): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.730161 kernel: audit: type=1400 audit(1707469343.704:885): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.704000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:02:23.918522 env[1130]: time="2024-02-09T09:02:23.918428073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7eb008b9-a61c-46a1-b2c4-1b94d029d33c,Namespace:default,Attempt:0,}" Feb 9 09:02:24.046078 kubelet[1432]: E0209 09:02:24.040257 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:24.244757 systemd-networkd[999]: cali5ec59c6bf6e: Link UP Feb 9 09:02:24.249209 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:02:24.249384 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 09:02:24.248807 systemd-networkd[999]: cali5ec59c6bf6e: Gained carrier Feb 9 09:02:24.262890 kubelet[1432]: I0209 09:02:24.262840 1432 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-769c9cdcfc-qbrxc" podStartSLOduration=10.924572319 podCreationTimestamp="2024-02-09 09:02:09 +0000 UTC" firstStartedPulling="2024-02-09 09:02:11.377276179 +0000 UTC m=+62.488481593" lastFinishedPulling="2024-02-09 09:02:15.715437 +0000 UTC m=+66.826642425" observedRunningTime="2024-02-09 09:02:16.465251266 +0000 UTC m=+67.576456702" watchObservedRunningTime="2024-02-09 09:02:24.262733151 +0000 UTC m=+75.373938591" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.061 [INFO][3196] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.227.99.217-k8s-test--pod--1-eth0 default 7eb008b9-a61c-46a1-b2c4-1b94d029d33c 1172 0 2024-02-09 09:01:54 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.227.99.217 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.062 [INFO][3196] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.131 [INFO][3208] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" HandleID="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Workload="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.167 [INFO][3208] ipam_plugin.go 268: Auto assigning IP ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" HandleID="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Workload="64.227.99.217-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c5610), Attrs:map[string]string{"namespace":"default", "node":"64.227.99.217", "pod":"test-pod-1", "timestamp":"2024-02-09 09:02:24.131644977 +0000 UTC"}, Hostname:"64.227.99.217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.167 [INFO][3208] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.167 [INFO][3208] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.167 [INFO][3208] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.227.99.217' Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.172 [INFO][3208] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.180 [INFO][3208] ipam.go 372: Looking up existing affinities for host host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.193 [INFO][3208] ipam.go 489: Trying affinity for 192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.197 [INFO][3208] ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.202 [INFO][3208] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.202 [INFO][3208] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.207 [INFO][3208] ipam.go 1682: Creating new handle: k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397 Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.216 [INFO][3208] ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.236 [INFO][3208] ipam.go 1216: Successfully claimed IPs: [192.168.82.5/26] block=192.168.82.0/26 handle="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.236 [INFO][3208] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.5/26] handle="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" host="64.227.99.217" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.236 [INFO][3208] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.236 [INFO][3208] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.82.5/26] IPv6=[] ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" HandleID="k8s-pod-network.deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Workload="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.238 [INFO][3196] k8s.go 385: Populated endpoint ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7eb008b9-a61c-46a1-b2c4-1b94d029d33c", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:24.275111 env[1130]: 2024-02-09 09:02:24.238 [INFO][3196] k8s.go 386: Calico CNI using IPs: [192.168.82.5/32] ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.276655 env[1130]: 2024-02-09 09:02:24.238 [INFO][3196] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.276655 env[1130]: 2024-02-09 09:02:24.250 [INFO][3196] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.276655 env[1130]: 2024-02-09 09:02:24.251 [INFO][3196] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.227.99.217-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7eb008b9-a61c-46a1-b2c4-1b94d029d33c", ResourceVersion:"1172", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 1, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.227.99.217", ContainerID:"deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"8e:d7:ed:cf:60:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:02:24.276655 env[1130]: 2024-02-09 09:02:24.271 [INFO][3196] k8s.go 491: Wrote updated endpoint to datastore ContainerID="deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.227.99.217-k8s-test--pod--1-eth0" Feb 9 09:02:24.288000 audit[3227]: NETFILTER_CFG table=filter:95 family=2 entries=38 op=nft_register_chain pid=3227 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:02:24.288000 audit[3227]: SYSCALL arch=c000003e syscall=46 success=yes exit=19064 a0=3 a1=7ffeb3f80b60 a2=0 a3=7ffeb3f80b4c items=0 ppid=2157 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:02:24.293914 kernel: audit: type=1325 audit(1707469344.288:886): table=filter:95 family=2 entries=38 op=nft_register_chain pid=3227 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:02:24.303827 env[1130]: time="2024-02-09T09:02:24.303403544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:02:24.303827 env[1130]: time="2024-02-09T09:02:24.303463939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:02:24.303827 env[1130]: time="2024-02-09T09:02:24.303479125Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:02:24.310521 env[1130]: time="2024-02-09T09:02:24.303776145Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397 pid=3236 runtime=io.containerd.runc.v2 Feb 9 09:02:24.336607 systemd[1]: run-containerd-runc-k8s.io-deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397-runc.lcsuBN.mount: Deactivated successfully. Feb 9 09:02:24.342355 systemd[1]: Started cri-containerd-deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397.scope. Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.365000 audit: BPF prog-id=122 op=LOAD Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3236 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616561363937313833316435653466633137633062393662623332 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3236 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616561363937313833316435653466633137633062393662623332 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.380000 audit: BPF prog-id=123 op=LOAD Feb 9 09:02:24.380000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000285020 items=0 ppid=3236 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616561363937313833316435653466633137633062393662623332 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit: BPF prog-id=124 op=LOAD Feb 9 09:02:24.381000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000285068 items=0 ppid=3236 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616561363937313833316435653466633137633062393662623332 Feb 9 09:02:24.381000 audit: BPF prog-id=124 op=UNLOAD Feb 9 09:02:24.381000 audit: BPF prog-id=123 op=UNLOAD Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { perfmon } for pid=3245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit[3245]: AVC avc: denied { bpf } for pid=3245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:24.381000 audit: BPF prog-id=125 op=LOAD Feb 9 09:02:24.381000 audit[3245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000285478 items=0 ppid=3236 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:24.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465616561363937313833316435653466633137633062393662623332 Feb 9 09:02:24.432774 env[1130]: time="2024-02-09T09:02:24.432693403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7eb008b9-a61c-46a1-b2c4-1b94d029d33c,Namespace:default,Attempt:0,} returns sandbox id \"deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397\"" Feb 9 09:02:24.436146 env[1130]: time="2024-02-09T09:02:24.436097859Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 09:02:24.893593 env[1130]: time="2024-02-09T09:02:24.893476532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:24.897029 env[1130]: time="2024-02-09T09:02:24.896966642Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:24.899678 env[1130]: time="2024-02-09T09:02:24.899619556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:24.902427 env[1130]: time="2024-02-09T09:02:24.902357929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:02:24.903765 env[1130]: time="2024-02-09T09:02:24.903702453Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 09:02:24.907667 env[1130]: time="2024-02-09T09:02:24.907622776Z" level=info msg="CreateContainer within sandbox \"deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 09:02:24.945208 env[1130]: time="2024-02-09T09:02:24.945129805Z" level=info msg="CreateContainer within sandbox \"deaea6971831d5e4fc17c0b96bb32f1964595a60b74cca634775a64b729d2397\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"aa26049694196d4427d1f826328a18669844421ed42c68d4ee65afc4bb087a5c\"" Feb 9 09:02:24.947220 env[1130]: time="2024-02-09T09:02:24.947169364Z" level=info msg="StartContainer for \"aa26049694196d4427d1f826328a18669844421ed42c68d4ee65afc4bb087a5c\"" Feb 9 09:02:24.974406 systemd[1]: Started cri-containerd-aa26049694196d4427d1f826328a18669844421ed42c68d4ee65afc4bb087a5c.scope. Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.011000 audit: BPF prog-id=126 op=LOAD Feb 9 09:02:25.013000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.013000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3236 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:25.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323630343936393431393664343432376431663832363332386131 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3236 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:25.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323630343936393431393664343432376431663832363332386131 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.014000 audit: BPF prog-id=127 op=LOAD Feb 9 09:02:25.014000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003047f0 items=0 ppid=3236 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:25.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323630343936393431393664343432376431663832363332386131 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.016000 audit: BPF prog-id=128 op=LOAD Feb 9 09:02:25.016000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304838 items=0 ppid=3236 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:25.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323630343936393431393664343432376431663832363332386131 Feb 9 09:02:25.017000 audit: BPF prog-id=128 op=UNLOAD Feb 9 09:02:25.017000 audit: BPF prog-id=127 op=UNLOAD Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { perfmon } for pid=3280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit[3280]: AVC avc: denied { bpf } for pid=3280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:02:25.017000 audit: BPF prog-id=129 op=LOAD Feb 9 09:02:25.017000 audit[3280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000304c48 items=0 ppid=3236 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:02:25.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161323630343936393431393664343432376431663832363332386131 Feb 9 09:02:25.046958 kubelet[1432]: E0209 09:02:25.046893 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:25.066383 env[1130]: time="2024-02-09T09:02:25.066311197Z" level=info msg="StartContainer for \"aa26049694196d4427d1f826328a18669844421ed42c68d4ee65afc4bb087a5c\" returns successfully" Feb 9 09:02:25.145235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1600568421.mount: Deactivated successfully. Feb 9 09:02:25.779826 systemd-networkd[999]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 09:02:26.047878 kubelet[1432]: E0209 09:02:26.047691 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:27.048652 kubelet[1432]: E0209 09:02:27.048594 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:28.050128 kubelet[1432]: E0209 09:02:28.050024 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:02:29.050749 kubelet[1432]: E0209 09:02:29.050645 1432 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"