Feb 9 09:13:12.975039 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 09:13:12.975083 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:13:12.975104 kernel: BIOS-provided physical RAM map: Feb 9 09:13:12.975116 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 09:13:12.975128 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 09:13:12.975138 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 09:13:12.975152 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 9 09:13:12.975163 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 9 09:13:12.975177 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 09:13:12.975187 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 09:13:12.975199 kernel: NX (Execute Disable) protection: active Feb 9 09:13:12.975210 kernel: SMBIOS 2.8 present. Feb 9 09:13:12.975220 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 9 09:13:12.975232 kernel: Hypervisor detected: KVM Feb 9 09:13:12.975246 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 09:13:12.975262 kernel: kvm-clock: cpu 0, msr 18faa001, primary cpu clock Feb 9 09:13:12.975274 kernel: kvm-clock: using sched offset of 3601104485 cycles Feb 9 09:13:12.975303 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 09:13:12.975316 kernel: tsc: Detected 2000.000 MHz processor Feb 9 09:13:12.975328 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 09:13:12.975341 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 09:13:12.975354 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 9 09:13:12.975368 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 09:13:12.975384 kernel: ACPI: Early table checksum verification disabled Feb 9 09:13:12.975396 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 9 09:13:12.975410 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975423 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975435 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975448 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 09:13:12.975460 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975471 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975482 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975497 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 09:13:12.975509 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 9 09:13:12.975520 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 9 09:13:12.975532 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 09:13:12.975543 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 9 09:13:12.975554 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 9 09:13:12.975565 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 9 09:13:12.975578 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 9 09:13:12.975598 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 09:13:12.975611 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 09:13:12.975622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 09:13:12.975631 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 9 09:13:12.975640 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 9 09:13:12.975648 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 9 09:13:12.975660 kernel: Zone ranges: Feb 9 09:13:12.975669 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 09:13:12.975677 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 9 09:13:12.975686 kernel: Normal empty Feb 9 09:13:12.975694 kernel: Movable zone start for each node Feb 9 09:13:12.975702 kernel: Early memory node ranges Feb 9 09:13:12.975711 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 09:13:12.975719 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 9 09:13:12.975727 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 9 09:13:12.975738 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 09:13:12.975747 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 09:13:12.975772 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 9 09:13:12.975781 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 09:13:12.975789 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 09:13:12.975797 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 09:13:12.975805 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 09:13:12.975813 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 09:13:12.975822 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 09:13:12.975834 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 09:13:12.975842 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 09:13:12.975850 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 09:13:12.975858 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 09:13:12.975866 kernel: TSC deadline timer available Feb 9 09:13:12.975875 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 09:13:12.975883 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 09:13:12.975891 kernel: Booting paravirtualized kernel on KVM Feb 9 09:13:12.975899 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 09:13:12.975910 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 09:13:12.975918 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 09:13:12.975926 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 09:13:12.975934 kernel: pcpu-alloc: [0] 0 1 Feb 9 09:13:12.975942 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 09:13:12.975950 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 09:13:12.975958 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 9 09:13:12.975966 kernel: Policy zone: DMA32 Feb 9 09:13:12.975977 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:13:12.975988 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:13:12.975997 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:13:12.976005 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 09:13:12.976013 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:13:12.976021 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 09:13:12.976029 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:13:12.976038 kernel: Kernel/User page tables isolation: enabled Feb 9 09:13:12.976046 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 09:13:12.976056 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 09:13:12.976064 kernel: rcu: Hierarchical RCU implementation. Feb 9 09:13:12.976073 kernel: rcu: RCU event tracing is enabled. Feb 9 09:13:12.976082 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:13:12.976090 kernel: Rude variant of Tasks RCU enabled. Feb 9 09:13:12.976098 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:13:12.976107 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:13:12.976115 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:13:12.976123 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 09:13:12.976133 kernel: random: crng init done Feb 9 09:13:12.976142 kernel: Console: colour VGA+ 80x25 Feb 9 09:13:12.976150 kernel: printk: console [tty0] enabled Feb 9 09:13:12.976158 kernel: printk: console [ttyS0] enabled Feb 9 09:13:12.976167 kernel: ACPI: Core revision 20210730 Feb 9 09:13:12.976175 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 09:13:12.976183 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 09:13:12.976191 kernel: x2apic enabled Feb 9 09:13:12.976200 kernel: Switched APIC routing to physical x2apic. Feb 9 09:13:12.976210 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 09:13:12.976218 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x39a85c9bff6, max_idle_ns: 881590591483 ns Feb 9 09:13:12.976226 kernel: Calibrating delay loop (skipped) preset value.. 4000.00 BogoMIPS (lpj=2000000) Feb 9 09:13:12.976235 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 09:13:12.976243 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 09:13:12.976253 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 09:13:12.976266 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 09:13:12.976279 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 09:13:12.976292 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 09:13:12.976307 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 9 09:13:12.976333 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 09:13:12.976342 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 09:13:12.976354 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 09:13:12.976363 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 09:13:12.976371 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 09:13:12.976381 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 09:13:12.976389 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 09:13:12.976398 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 09:13:12.976407 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 09:13:12.976419 kernel: Freeing SMP alternatives memory: 32K Feb 9 09:13:12.976427 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:13:12.976436 kernel: LSM: Security Framework initializing Feb 9 09:13:12.976444 kernel: SELinux: Initializing. Feb 9 09:13:12.976453 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 09:13:12.976462 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 09:13:12.976472 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 9 09:13:12.976481 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 09:13:12.976490 kernel: signal: max sigframe size: 1776 Feb 9 09:13:12.976498 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:13:12.976507 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 09:13:12.976515 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:13:12.976523 kernel: x86: Booting SMP configuration: Feb 9 09:13:12.976532 kernel: .... node #0, CPUs: #1 Feb 9 09:13:12.976541 kernel: kvm-clock: cpu 1, msr 18faa041, secondary cpu clock Feb 9 09:13:12.976549 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 09:13:12.976562 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:13:12.976570 kernel: smpboot: Max logical packages: 1 Feb 9 09:13:12.976579 kernel: smpboot: Total of 2 processors activated (8000.00 BogoMIPS) Feb 9 09:13:12.976587 kernel: devtmpfs: initialized Feb 9 09:13:12.976596 kernel: x86/mm: Memory block size: 128MB Feb 9 09:13:12.976604 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:13:12.976613 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:13:12.976622 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:13:12.976630 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:13:12.976642 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:13:12.976651 kernel: audit: type=2000 audit(1707469992.909:1): state=initialized audit_enabled=0 res=1 Feb 9 09:13:12.976659 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:13:12.976668 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 09:13:12.976677 kernel: cpuidle: using governor menu Feb 9 09:13:12.976685 kernel: ACPI: bus type PCI registered Feb 9 09:13:12.976694 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:13:12.976703 kernel: dca service started, version 1.12.1 Feb 9 09:13:12.976711 kernel: PCI: Using configuration type 1 for base access Feb 9 09:13:12.976723 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 09:13:12.976732 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:13:12.976741 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:13:12.976761 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:13:12.978837 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:13:12.978852 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:13:12.978862 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:13:12.978871 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:13:12.978881 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:13:12.978895 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:13:12.978904 kernel: ACPI: Interpreter enabled Feb 9 09:13:12.978913 kernel: ACPI: PM: (supports S0 S5) Feb 9 09:13:12.978921 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 09:13:12.978930 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 09:13:12.978939 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 09:13:12.978948 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 09:13:12.979230 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 09:13:12.979379 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 09:13:12.979393 kernel: acpiphp: Slot [3] registered Feb 9 09:13:12.979402 kernel: acpiphp: Slot [4] registered Feb 9 09:13:12.979410 kernel: acpiphp: Slot [5] registered Feb 9 09:13:12.979419 kernel: acpiphp: Slot [6] registered Feb 9 09:13:12.979427 kernel: acpiphp: Slot [7] registered Feb 9 09:13:12.979436 kernel: acpiphp: Slot [8] registered Feb 9 09:13:12.979445 kernel: acpiphp: Slot [9] registered Feb 9 09:13:12.979457 kernel: acpiphp: Slot [10] registered Feb 9 09:13:12.979466 kernel: acpiphp: Slot [11] registered Feb 9 09:13:12.979475 kernel: acpiphp: Slot [12] registered Feb 9 09:13:12.979484 kernel: acpiphp: Slot [13] registered Feb 9 09:13:12.979493 kernel: acpiphp: Slot [14] registered Feb 9 09:13:12.979502 kernel: acpiphp: Slot [15] registered Feb 9 09:13:12.979510 kernel: acpiphp: Slot [16] registered Feb 9 09:13:12.979519 kernel: acpiphp: Slot [17] registered Feb 9 09:13:12.979528 kernel: acpiphp: Slot [18] registered Feb 9 09:13:12.979536 kernel: acpiphp: Slot [19] registered Feb 9 09:13:12.979547 kernel: acpiphp: Slot [20] registered Feb 9 09:13:12.979556 kernel: acpiphp: Slot [21] registered Feb 9 09:13:12.979565 kernel: acpiphp: Slot [22] registered Feb 9 09:13:12.979573 kernel: acpiphp: Slot [23] registered Feb 9 09:13:12.979582 kernel: acpiphp: Slot [24] registered Feb 9 09:13:12.979591 kernel: acpiphp: Slot [25] registered Feb 9 09:13:12.979600 kernel: acpiphp: Slot [26] registered Feb 9 09:13:12.979608 kernel: acpiphp: Slot [27] registered Feb 9 09:13:12.979617 kernel: acpiphp: Slot [28] registered Feb 9 09:13:12.979628 kernel: acpiphp: Slot [29] registered Feb 9 09:13:12.979636 kernel: acpiphp: Slot [30] registered Feb 9 09:13:12.979645 kernel: acpiphp: Slot [31] registered Feb 9 09:13:12.979653 kernel: PCI host bridge to bus 0000:00 Feb 9 09:13:12.979801 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 09:13:12.979902 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 09:13:12.979998 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 09:13:12.980095 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 09:13:12.980196 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 09:13:12.980296 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 09:13:12.980445 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 09:13:12.980578 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 09:13:12.980700 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 09:13:12.983053 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 9 09:13:12.983336 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 09:13:12.983532 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 09:13:12.983705 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 09:13:12.988043 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 09:13:12.988222 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 9 09:13:12.988330 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 9 09:13:12.988445 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 09:13:12.988560 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 09:13:12.988662 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 09:13:12.988803 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 09:13:12.988911 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 09:13:12.989020 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 09:13:12.989122 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 9 09:13:12.989226 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 9 09:13:12.989327 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 09:13:12.989441 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 09:13:12.989542 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 9 09:13:12.989643 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 9 09:13:12.989790 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 09:13:12.989924 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 09:13:12.990029 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 9 09:13:12.990127 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 9 09:13:12.990224 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 09:13:12.990333 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 9 09:13:12.990441 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 9 09:13:12.990542 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 9 09:13:12.990641 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 09:13:12.990767 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 9 09:13:12.990883 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 09:13:12.991018 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 9 09:13:12.991120 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 09:13:12.991228 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 9 09:13:12.991348 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 9 09:13:12.991491 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 9 09:13:12.991608 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 9 09:13:12.991717 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 09:13:12.991844 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 9 09:13:12.991946 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 9 09:13:12.991958 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 09:13:12.991967 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 09:13:12.991976 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 09:13:12.991989 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 09:13:12.991997 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 09:13:12.992006 kernel: iommu: Default domain type: Translated Feb 9 09:13:12.992015 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 09:13:12.992117 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 09:13:12.992219 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 09:13:12.992319 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 09:13:12.992330 kernel: vgaarb: loaded Feb 9 09:13:12.992342 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:13:12.992351 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:13:12.992360 kernel: PTP clock support registered Feb 9 09:13:12.992369 kernel: PCI: Using ACPI for IRQ routing Feb 9 09:13:12.992377 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 09:13:12.992386 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 09:13:12.992395 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 9 09:13:12.992403 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 09:13:12.992412 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 09:13:12.992423 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 09:13:12.992431 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:13:12.992441 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:13:12.992450 kernel: pnp: PnP ACPI init Feb 9 09:13:12.992458 kernel: pnp: PnP ACPI: found 4 devices Feb 9 09:13:12.992467 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 09:13:12.992476 kernel: NET: Registered PF_INET protocol family Feb 9 09:13:12.992484 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:13:12.992493 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 09:13:12.992507 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:13:12.992519 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 09:13:12.992531 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 09:13:12.992543 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 09:13:12.992555 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 09:13:12.992566 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 09:13:12.992578 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:13:12.992590 kernel: NET: Registered PF_XDP protocol family Feb 9 09:13:12.992742 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 09:13:12.996221 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 09:13:12.996323 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 09:13:12.996415 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 09:13:12.996506 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 09:13:12.996624 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 09:13:12.996735 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 09:13:12.996867 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 09:13:12.996885 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 09:13:12.996989 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 34732 usecs Feb 9 09:13:12.997001 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:13:12.997011 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 09:13:12.997020 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39a85c9bff6, max_idle_ns: 881590591483 ns Feb 9 09:13:12.997029 kernel: Initialise system trusted keyrings Feb 9 09:13:12.997038 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 09:13:12.997047 kernel: Key type asymmetric registered Feb 9 09:13:12.997056 kernel: Asymmetric key parser 'x509' registered Feb 9 09:13:12.997068 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:13:12.997077 kernel: io scheduler mq-deadline registered Feb 9 09:13:12.997086 kernel: io scheduler kyber registered Feb 9 09:13:12.997094 kernel: io scheduler bfq registered Feb 9 09:13:12.997103 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 09:13:12.997112 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 09:13:12.997121 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 09:13:12.997129 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 09:13:12.997138 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:13:12.997147 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 09:13:12.997158 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 09:13:12.997167 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 09:13:12.997176 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 09:13:12.997309 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 9 09:13:12.997323 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 09:13:12.997426 kernel: rtc_cmos 00:03: registered as rtc0 Feb 9 09:13:12.997548 kernel: rtc_cmos 00:03: setting system clock to 2024-02-09T09:13:12 UTC (1707469992) Feb 9 09:13:12.997668 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 9 09:13:12.997681 kernel: intel_pstate: CPU model not supported Feb 9 09:13:12.997689 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:13:12.997701 kernel: Segment Routing with IPv6 Feb 9 09:13:12.997714 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:13:12.997727 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:13:12.997740 kernel: Key type dns_resolver registered Feb 9 09:13:12.997772 kernel: IPI shorthand broadcast: enabled Feb 9 09:13:12.997781 kernel: sched_clock: Marking stable (803303072, 121571228)->(1047867540, -122993240) Feb 9 09:13:12.997794 kernel: registered taskstats version 1 Feb 9 09:13:12.997802 kernel: Loading compiled-in X.509 certificates Feb 9 09:13:12.997812 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 09:13:12.997821 kernel: Key type .fscrypt registered Feb 9 09:13:12.997829 kernel: Key type fscrypt-provisioning registered Feb 9 09:13:12.997838 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:13:12.997847 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:13:12.997856 kernel: ima: No architecture policies found Feb 9 09:13:12.997868 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 09:13:12.997884 kernel: Write protecting the kernel read-only data: 28672k Feb 9 09:13:12.997898 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 09:13:12.997909 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 09:13:12.997918 kernel: Run /init as init process Feb 9 09:13:12.997927 kernel: with arguments: Feb 9 09:13:12.997936 kernel: /init Feb 9 09:13:12.997969 kernel: with environment: Feb 9 09:13:12.997986 kernel: HOME=/ Feb 9 09:13:12.997999 kernel: TERM=linux Feb 9 09:13:12.998011 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:13:12.998025 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:13:12.998041 systemd[1]: Detected virtualization kvm. Feb 9 09:13:12.998052 systemd[1]: Detected architecture x86-64. Feb 9 09:13:12.998062 systemd[1]: Running in initrd. Feb 9 09:13:12.998071 systemd[1]: No hostname configured, using default hostname. Feb 9 09:13:12.998080 systemd[1]: Hostname set to . Feb 9 09:13:12.998096 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:13:12.998111 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:13:12.998122 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:13:12.998132 systemd[1]: Reached target cryptsetup.target. Feb 9 09:13:12.998142 systemd[1]: Reached target paths.target. Feb 9 09:13:12.998151 systemd[1]: Reached target slices.target. Feb 9 09:13:12.998160 systemd[1]: Reached target swap.target. Feb 9 09:13:12.998170 systemd[1]: Reached target timers.target. Feb 9 09:13:12.998197 systemd[1]: Listening on iscsid.socket. Feb 9 09:13:12.998209 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:13:12.998219 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:13:12.998229 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:13:12.998239 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:13:12.998249 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:13:12.998258 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:13:12.998268 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:13:12.998281 systemd[1]: Reached target sockets.target. Feb 9 09:13:12.998290 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:13:12.998305 systemd[1]: Finished network-cleanup.service. Feb 9 09:13:12.998322 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:13:12.998332 systemd[1]: Starting systemd-journald.service... Feb 9 09:13:12.998342 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:13:12.998354 systemd[1]: Starting systemd-resolved.service... Feb 9 09:13:12.998363 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:13:12.998373 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:13:12.998383 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:13:12.998407 systemd-journald[184]: Journal started Feb 9 09:13:12.998487 systemd-journald[184]: Runtime Journal (/run/log/journal/1dedd53ee3de4c1c9864cefa5d2e182d) is 4.9M, max 39.5M, 34.5M free. Feb 9 09:13:12.981283 systemd-modules-load[185]: Inserted module 'overlay' Feb 9 09:13:13.035386 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:13:13.035421 kernel: Bridge firewalling registered Feb 9 09:13:13.018783 systemd-resolved[186]: Positive Trust Anchors: Feb 9 09:13:13.043910 systemd[1]: Started systemd-journald.service. Feb 9 09:13:13.043948 kernel: audit: type=1130 audit(1707469993.034:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.018796 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:13:13.018828 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:13:13.052485 kernel: SCSI subsystem initialized Feb 9 09:13:13.052518 kernel: audit: type=1130 audit(1707469993.045:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.021962 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 9 09:13:13.023120 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 9 09:13:13.052084 systemd[1]: Started systemd-resolved.service. Feb 9 09:13:13.062613 kernel: audit: type=1130 audit(1707469993.054:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.062687 kernel: audit: type=1130 audit(1707469993.058:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.062701 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:13:13.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.058687 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:13:13.069226 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:13:13.069305 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:13:13.062577 systemd[1]: Reached target nss-lookup.target. Feb 9 09:13:13.069486 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:13:13.069605 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 9 09:13:13.072015 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:13:13.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.079716 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:13:13.085352 kernel: audit: type=1130 audit(1707469993.079:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.084231 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:13:13.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.090456 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:13:13.095139 kernel: audit: type=1130 audit(1707469993.090:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.096218 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:13:13.109147 kernel: audit: type=1130 audit(1707469993.095:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.111172 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:13:13.118168 kernel: audit: type=1130 audit(1707469993.110:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.113151 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:13:13.127137 dracut-cmdline[209]: dracut-dracut-053 Feb 9 09:13:13.130268 dracut-cmdline[209]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 09:13:13.222821 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:13:13.238804 kernel: iscsi: registered transport (tcp) Feb 9 09:13:13.269047 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:13:13.269156 kernel: QLogic iSCSI HBA Driver Feb 9 09:13:13.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.320967 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:13:13.325399 kernel: audit: type=1130 audit(1707469993.320:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.323266 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:13:13.389860 kernel: raid6: avx2x4 gen() 25041 MB/s Feb 9 09:13:13.406845 kernel: raid6: avx2x4 xor() 7961 MB/s Feb 9 09:13:13.423839 kernel: raid6: avx2x2 gen() 23310 MB/s Feb 9 09:13:13.440861 kernel: raid6: avx2x2 xor() 16056 MB/s Feb 9 09:13:13.457838 kernel: raid6: avx2x1 gen() 15168 MB/s Feb 9 09:13:13.474959 kernel: raid6: avx2x1 xor() 12027 MB/s Feb 9 09:13:13.491843 kernel: raid6: sse2x4 gen() 10806 MB/s Feb 9 09:13:13.509842 kernel: raid6: sse2x4 xor() 5008 MB/s Feb 9 09:13:13.526843 kernel: raid6: sse2x2 gen() 7327 MB/s Feb 9 09:13:13.543844 kernel: raid6: sse2x2 xor() 6511 MB/s Feb 9 09:13:13.560842 kernel: raid6: sse2x1 gen() 5087 MB/s Feb 9 09:13:13.578502 kernel: raid6: sse2x1 xor() 4394 MB/s Feb 9 09:13:13.578621 kernel: raid6: using algorithm avx2x4 gen() 25041 MB/s Feb 9 09:13:13.578644 kernel: raid6: .... xor() 7961 MB/s, rmw enabled Feb 9 09:13:13.579637 kernel: raid6: using avx2x2 recovery algorithm Feb 9 09:13:13.597802 kernel: xor: automatically using best checksumming function avx Feb 9 09:13:13.739848 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 09:13:13.754077 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:13:13.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.754000 audit: BPF prog-id=7 op=LOAD Feb 9 09:13:13.754000 audit: BPF prog-id=8 op=LOAD Feb 9 09:13:13.756089 systemd[1]: Starting systemd-udevd.service... Feb 9 09:13:13.773087 systemd-udevd[386]: Using default interface naming scheme 'v252'. Feb 9 09:13:13.779743 systemd[1]: Started systemd-udevd.service. Feb 9 09:13:13.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.784806 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:13:13.802622 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Feb 9 09:13:13.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.849633 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:13:13.851600 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:13:13.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:13.909299 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:13:13.980225 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 9 09:13:13.991786 kernel: scsi host0: Virtio SCSI HBA Feb 9 09:13:13.998726 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 09:13:13.998844 kernel: GPT:9289727 != 125829119 Feb 9 09:13:13.998858 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 09:13:13.998870 kernel: GPT:9289727 != 125829119 Feb 9 09:13:14.000543 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 09:13:14.002243 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 09:13:14.005468 kernel: virtio_blk virtio5: [vdb] 948 512-byte logical blocks (485 kB/474 KiB) Feb 9 09:13:14.012059 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:13:14.053897 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 09:13:14.053987 kernel: AES CTR mode by8 optimization enabled Feb 9 09:13:14.070790 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (439) Feb 9 09:13:14.076025 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:13:14.079214 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:13:14.085927 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:13:14.095572 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:13:14.101939 systemd[1]: Starting disk-uuid.service... Feb 9 09:13:14.112098 disk-uuid[465]: Primary Header is updated. Feb 9 09:13:14.112098 disk-uuid[465]: Secondary Entries is updated. Feb 9 09:13:14.112098 disk-uuid[465]: Secondary Header is updated. Feb 9 09:13:14.131791 kernel: ACPI: bus type USB registered Feb 9 09:13:14.131890 kernel: usbcore: registered new interface driver usbfs Feb 9 09:13:14.136409 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:13:14.248357 kernel: usbcore: registered new interface driver hub Feb 9 09:13:14.248390 kernel: usbcore: registered new device driver usb Feb 9 09:13:14.248402 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 9 09:13:14.248414 kernel: ehci-pci: EHCI PCI platform driver Feb 9 09:13:14.248433 kernel: libata version 3.00 loaded. Feb 9 09:13:14.248446 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 09:13:14.248788 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 9 09:13:14.248806 kernel: scsi host1: ata_piix Feb 9 09:13:14.248971 kernel: scsi host2: ata_piix Feb 9 09:13:14.249099 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 9 09:13:14.249110 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 9 09:13:14.249121 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 9 09:13:14.249242 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 9 09:13:14.249348 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 9 09:13:14.249458 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 9 09:13:14.249563 kernel: hub 1-0:1.0: USB hub found Feb 9 09:13:14.249704 kernel: hub 1-0:1.0: 2 ports detected Feb 9 09:13:15.130782 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 09:13:15.131211 disk-uuid[466]: The operation has completed successfully. Feb 9 09:13:15.173042 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:13:15.174067 systemd[1]: Finished disk-uuid.service. Feb 9 09:13:15.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.176245 systemd[1]: Starting verity-setup.service... Feb 9 09:13:15.201810 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 09:13:15.257558 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:13:15.259748 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:13:15.261357 systemd[1]: Finished verity-setup.service. Feb 9 09:13:15.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.363126 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:13:15.363747 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:13:15.364616 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:13:15.365640 systemd[1]: Starting ignition-setup.service... Feb 9 09:13:15.367140 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:13:15.381899 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:13:15.382012 kernel: BTRFS info (device vda6): using free space tree Feb 9 09:13:15.382034 kernel: BTRFS info (device vda6): has skinny extents Feb 9 09:13:15.407495 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:13:15.416636 systemd[1]: Finished ignition-setup.service. Feb 9 09:13:15.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.418969 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:13:15.515565 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:13:15.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.516000 audit: BPF prog-id=9 op=LOAD Feb 9 09:13:15.521408 systemd[1]: Starting systemd-networkd.service... Feb 9 09:13:15.551896 systemd-networkd[689]: lo: Link UP Feb 9 09:13:15.553138 systemd-networkd[689]: lo: Gained carrier Feb 9 09:13:15.556210 systemd-networkd[689]: Enumeration completed Feb 9 09:13:15.557240 systemd[1]: Started systemd-networkd.service. Feb 9 09:13:15.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.557999 systemd[1]: Reached target network.target. Feb 9 09:13:15.560322 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:13:15.560462 systemd[1]: Starting iscsiuio.service... Feb 9 09:13:15.563200 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 9 09:13:15.568385 systemd-networkd[689]: eth1: Link UP Feb 9 09:13:15.569309 systemd-networkd[689]: eth1: Gained carrier Feb 9 09:13:15.576389 systemd-networkd[689]: eth0: Link UP Feb 9 09:13:15.577061 systemd-networkd[689]: eth0: Gained carrier Feb 9 09:13:15.591466 ignition[610]: Ignition 2.14.0 Feb 9 09:13:15.591484 ignition[610]: Stage: fetch-offline Feb 9 09:13:15.592315 systemd[1]: Started iscsiuio.service. Feb 9 09:13:15.591583 ignition[610]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:15.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.591632 ignition[610]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:15.594333 systemd[1]: Starting iscsid.service... Feb 9 09:13:15.600377 ignition[610]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:15.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.602603 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:13:15.602603 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:13:15.602603 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:13:15.602603 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:13:15.602603 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:13:15.602603 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:13:15.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.600947 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.4/20 acquired from 169.254.169.253 Feb 9 09:13:15.600570 ignition[610]: parsed url from cmdline: "" Feb 9 09:13:15.601889 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:13:15.600574 ignition[610]: no config URL provided Feb 9 09:13:15.603579 systemd[1]: Starting ignition-fetch.service... Feb 9 09:13:15.600582 ignition[610]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:13:15.616023 systemd-networkd[689]: eth0: DHCPv4 address 24.144.85.89/20, gateway 24.144.80.1 acquired from 169.254.169.253 Feb 9 09:13:15.600592 ignition[610]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:13:15.619391 systemd[1]: Started iscsid.service. Feb 9 09:13:15.600599 ignition[610]: failed to fetch config: resource requires networking Feb 9 09:13:15.620979 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:13:15.600720 ignition[610]: Ignition finished successfully Feb 9 09:13:15.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.620824 ignition[695]: Ignition 2.14.0 Feb 9 09:13:15.642585 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:13:15.620920 ignition[695]: Stage: fetch Feb 9 09:13:15.643375 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:13:15.621110 ignition[695]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:15.643809 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:13:15.621131 ignition[695]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:15.644245 systemd[1]: Reached target remote-fs.target. Feb 9 09:13:15.624630 ignition[695]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:15.645665 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:13:15.624828 ignition[695]: parsed url from cmdline: "" Feb 9 09:13:15.624833 ignition[695]: no config URL provided Feb 9 09:13:15.624840 ignition[695]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:13:15.624851 ignition[695]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:13:15.657481 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:13:15.624885 ignition[695]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 9 09:13:15.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.650243 ignition[695]: GET result: OK Feb 9 09:13:15.650371 ignition[695]: parsing config with SHA512: da50ac94c6557832b0ebfcd22f9d84af5c4d3edbd24cf169f0df62731b35b05f4ffb38783d737ffc7e98fabae276d5aa3c06abe72a6ea5ff24b49dd9af8c05b4 Feb 9 09:13:15.686336 unknown[695]: fetched base config from "system" Feb 9 09:13:15.687225 unknown[695]: fetched base config from "system" Feb 9 09:13:15.687994 unknown[695]: fetched user config from "digitalocean" Feb 9 09:13:15.689083 ignition[695]: fetch: fetch complete Feb 9 09:13:15.689779 ignition[695]: fetch: fetch passed Feb 9 09:13:15.690628 ignition[695]: Ignition finished successfully Feb 9 09:13:15.693507 systemd[1]: Finished ignition-fetch.service. Feb 9 09:13:15.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.695260 systemd[1]: Starting ignition-kargs.service... Feb 9 09:13:15.707397 ignition[714]: Ignition 2.14.0 Feb 9 09:13:15.708387 ignition[714]: Stage: kargs Feb 9 09:13:15.709080 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:15.709895 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:15.712106 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:15.714337 ignition[714]: kargs: kargs passed Feb 9 09:13:15.714982 ignition[714]: Ignition finished successfully Feb 9 09:13:15.717077 systemd[1]: Finished ignition-kargs.service. Feb 9 09:13:15.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.719401 systemd[1]: Starting ignition-disks.service... Feb 9 09:13:15.734300 ignition[720]: Ignition 2.14.0 Feb 9 09:13:15.734315 ignition[720]: Stage: disks Feb 9 09:13:15.734463 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:15.734488 ignition[720]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:15.736744 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:15.738042 ignition[720]: disks: disks passed Feb 9 09:13:15.738110 ignition[720]: Ignition finished successfully Feb 9 09:13:15.739482 systemd[1]: Finished ignition-disks.service. Feb 9 09:13:15.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.740898 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:13:15.741632 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:13:15.742684 systemd[1]: Reached target local-fs.target. Feb 9 09:13:15.743717 systemd[1]: Reached target sysinit.target. Feb 9 09:13:15.744683 systemd[1]: Reached target basic.target. Feb 9 09:13:15.747221 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:13:15.766060 systemd-fsck[728]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 09:13:15.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.770615 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:13:15.772621 systemd[1]: Mounting sysroot.mount... Feb 9 09:13:15.787791 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:13:15.788260 systemd[1]: Mounted sysroot.mount. Feb 9 09:13:15.788897 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:13:15.791205 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:13:15.793102 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 9 09:13:15.794889 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:13:15.795559 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:13:15.795614 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:13:15.800907 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:13:15.802529 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:13:15.811250 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:13:15.833923 initrd-setup-root[748]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:13:15.848358 initrd-setup-root[758]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:13:15.860278 initrd-setup-root[768]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:13:15.933882 coreos-metadata[734]: Feb 09 09:13:15.933 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:13:15.937619 coreos-metadata[735]: Feb 09 09:13:15.937 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:13:15.951362 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:13:15.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.953052 systemd[1]: Starting ignition-mount.service... Feb 9 09:13:15.958810 coreos-metadata[734]: Feb 09 09:13:15.958 INFO Fetch successful Feb 9 09:13:15.961488 systemd[1]: Starting sysroot-boot.service... Feb 9 09:13:15.964614 coreos-metadata[735]: Feb 09 09:13:15.963 INFO Fetch successful Feb 9 09:13:15.966517 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 9 09:13:15.967723 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 9 09:13:15.969502 coreos-metadata[735]: Feb 09 09:13:15.969 INFO wrote hostname ci-3510.3.2-9-0cc2ab7272 to /sysroot/etc/hostname Feb 9 09:13:15.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.971391 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:13:15.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:15.976858 bash[785]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 09:13:15.999032 systemd[1]: Finished sysroot-boot.service. Feb 9 09:13:16.000168 ignition[787]: INFO : Ignition 2.14.0 Feb 9 09:13:16.000168 ignition[787]: INFO : Stage: mount Feb 9 09:13:15.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:16.001552 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:16.002480 ignition[787]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:16.005631 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:16.016803 ignition[787]: INFO : mount: mount passed Feb 9 09:13:16.017736 ignition[787]: INFO : Ignition finished successfully Feb 9 09:13:16.019718 systemd[1]: Finished ignition-mount.service. Feb 9 09:13:16.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:16.279801 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:13:16.288836 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (795) Feb 9 09:13:16.291845 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 09:13:16.291963 kernel: BTRFS info (device vda6): using free space tree Feb 9 09:13:16.291977 kernel: BTRFS info (device vda6): has skinny extents Feb 9 09:13:16.299102 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:13:16.301464 systemd[1]: Starting ignition-files.service... Feb 9 09:13:16.334883 ignition[815]: INFO : Ignition 2.14.0 Feb 9 09:13:16.334883 ignition[815]: INFO : Stage: files Feb 9 09:13:16.336398 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:16.336398 ignition[815]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:16.338434 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:16.342619 ignition[815]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:13:16.344878 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:13:16.344878 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:13:16.347579 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:13:16.348560 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:13:16.349659 unknown[815]: wrote ssh authorized keys file for user: core Feb 9 09:13:16.350669 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:13:16.351711 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 09:13:16.351711 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 09:13:16.873224 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:13:17.094778 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 09:13:17.096239 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 09:13:17.097356 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 09:13:17.098430 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 09:13:17.502228 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:13:17.575108 systemd-networkd[689]: eth1: Gained IPv6LL Feb 9 09:13:17.575556 systemd-networkd[689]: eth0: Gained IPv6LL Feb 9 09:13:17.631619 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 09:13:17.631619 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 09:13:17.635100 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:13:17.635100 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 09:13:17.696244 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:13:17.960217 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 09:13:17.960217 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:13:17.962734 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:13:17.962734 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 09:13:18.007646 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:13:18.701062 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 09:13:18.701062 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:13:18.704142 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(b): [started] processing unit "prepare-critools.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(b): op(c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(b): op(c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(b): [finished] processing unit "prepare-critools.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(d): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(d): op(e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(d): op(e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(d): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:13:18.704142 ignition[815]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 09:13:18.742735 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 09:13:18.742840 kernel: audit: type=1130 audit(1707469998.712:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.742856 kernel: audit: type=1130 audit(1707469998.726:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.742868 kernel: audit: type=1131 audit(1707469998.726:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.742889 kernel: audit: type=1130 audit(1707469998.733:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.743071 ignition[815]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:13:18.743071 ignition[815]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:13:18.743071 ignition[815]: INFO : files: op(11): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:13:18.743071 ignition[815]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:13:18.743071 ignition[815]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:13:18.743071 ignition[815]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:13:18.743071 ignition[815]: INFO : files: files passed Feb 9 09:13:18.743071 ignition[815]: INFO : Ignition finished successfully Feb 9 09:13:18.711420 systemd[1]: Finished ignition-files.service. Feb 9 09:13:18.715811 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:13:18.750076 initrd-setup-root-after-ignition[840]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:13:18.718411 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:13:18.720442 systemd[1]: Starting ignition-quench.service... Feb 9 09:13:18.724804 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:13:18.724953 systemd[1]: Finished ignition-quench.service. Feb 9 09:13:18.731042 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:13:18.734673 systemd[1]: Reached target ignition-complete.target. Feb 9 09:13:18.740435 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:13:18.760345 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:13:18.761224 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:13:18.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.763168 systemd[1]: Reached target initrd-fs.target. Feb 9 09:13:18.778458 kernel: audit: type=1130 audit(1707469998.761:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.778495 kernel: audit: type=1131 audit(1707469998.762:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.777980 systemd[1]: Reached target initrd.target. Feb 9 09:13:18.778891 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:13:18.780142 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:13:18.795229 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:13:18.801796 kernel: audit: type=1130 audit(1707469998.795:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.797328 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:13:18.808474 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:13:18.809721 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:13:18.810816 systemd[1]: Stopped target timers.target. Feb 9 09:13:18.811830 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:13:18.812607 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:13:18.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.814987 systemd[1]: Stopped target initrd.target. Feb 9 09:13:18.818072 kernel: audit: type=1131 audit(1707469998.813:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.818330 systemd[1]: Stopped target basic.target. Feb 9 09:13:18.819482 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:13:18.820564 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:13:18.821803 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:13:18.822927 systemd[1]: Stopped target remote-fs.target. Feb 9 09:13:18.824081 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:13:18.825272 systemd[1]: Stopped target sysinit.target. Feb 9 09:13:18.826256 systemd[1]: Stopped target local-fs.target. Feb 9 09:13:18.827250 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:13:18.828659 systemd[1]: Stopped target swap.target. Feb 9 09:13:18.829434 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:13:18.834529 kernel: audit: type=1131 audit(1707469998.829:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.829628 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:13:18.830508 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:13:18.835067 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:13:18.841381 kernel: audit: type=1131 audit(1707469998.835:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.835481 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:13:18.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.836741 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:13:18.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.837047 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:13:18.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.842254 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:13:18.842430 systemd[1]: Stopped ignition-files.service. Feb 9 09:13:18.843053 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:13:18.843180 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:13:18.847725 iscsid[694]: iscsid shutting down. Feb 9 09:13:18.845348 systemd[1]: Stopping ignition-mount.service... Feb 9 09:13:18.846176 systemd[1]: Stopping iscsid.service... Feb 9 09:13:18.853974 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:13:18.855170 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:13:18.856445 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:13:18.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.858130 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:13:18.858878 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:13:18.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.862264 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:13:18.862992 systemd[1]: Stopped iscsid.service. Feb 9 09:13:18.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.865260 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:13:18.865938 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:13:18.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.868263 systemd[1]: Stopping iscsiuio.service... Feb 9 09:13:18.872095 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:13:18.872888 systemd[1]: Stopped iscsiuio.service. Feb 9 09:13:18.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.875369 ignition[853]: INFO : Ignition 2.14.0 Feb 9 09:13:18.876151 ignition[853]: INFO : Stage: umount Feb 9 09:13:18.876914 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:13:18.877686 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 9 09:13:18.880924 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 9 09:13:18.883012 ignition[853]: INFO : umount: umount passed Feb 9 09:13:18.883817 ignition[853]: INFO : Ignition finished successfully Feb 9 09:13:18.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.885312 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:13:18.885431 systemd[1]: Stopped ignition-mount.service. Feb 9 09:13:18.886194 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:13:18.886249 systemd[1]: Stopped ignition-disks.service. Feb 9 09:13:18.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.886676 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:13:18.886712 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:13:18.887152 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:13:18.887189 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:13:18.887642 systemd[1]: Stopped target network.target. Feb 9 09:13:18.890974 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:13:18.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.891080 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:13:18.892526 systemd[1]: Stopped target paths.target. Feb 9 09:13:18.893018 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:13:18.896861 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:13:18.897632 systemd[1]: Stopped target slices.target. Feb 9 09:13:18.898020 systemd[1]: Stopped target sockets.target. Feb 9 09:13:18.898462 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:13:18.898513 systemd[1]: Closed iscsid.socket. Feb 9 09:13:18.898960 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:13:18.898995 systemd[1]: Closed iscsiuio.socket. Feb 9 09:13:18.899418 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:13:18.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.899466 systemd[1]: Stopped ignition-setup.service. Feb 9 09:13:18.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.900103 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:13:18.901307 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:13:18.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.903822 systemd-networkd[689]: eth0: DHCPv6 lease lost Feb 9 09:13:18.911000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:13:18.904169 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:13:18.906084 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:13:18.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.906226 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:13:18.907401 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:13:18.907534 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:13:18.908135 systemd-networkd[689]: eth1: DHCPv6 lease lost Feb 9 09:13:18.910301 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:13:18.910419 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:13:18.918000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:13:18.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.912282 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:13:18.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.912321 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:13:18.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.913426 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:13:18.913479 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:13:18.915280 systemd[1]: Stopping network-cleanup.service... Feb 9 09:13:18.915874 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:13:18.915950 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:13:18.919540 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:13:18.919603 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:13:18.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.920782 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:13:18.920835 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:13:18.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.921575 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:13:18.927517 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:13:18.938869 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:13:18.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.938996 systemd[1]: Stopped network-cleanup.service. Feb 9 09:13:18.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.940053 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:13:18.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.940215 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:13:18.941627 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:13:18.941670 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:13:18.942161 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:13:18.942197 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:13:18.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.943123 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:13:18.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.943181 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:13:18.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.944305 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:13:18.944357 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:13:18.945417 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:13:18.945473 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:13:18.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:18.947130 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:13:18.947786 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 09:13:18.947895 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 09:13:18.957216 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:13:18.957287 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:13:18.957841 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:13:18.957889 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:13:18.960154 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 09:13:18.960806 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:13:18.960945 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:13:18.961731 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:13:18.963413 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:13:18.976935 systemd[1]: Switching root. Feb 9 09:13:19.001197 systemd-journald[184]: Journal stopped Feb 9 09:13:23.271702 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Feb 9 09:13:23.271849 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:13:23.271874 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:13:23.271893 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:13:23.271911 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:13:23.271925 kernel: SELinux: policy capability open_perms=1 Feb 9 09:13:23.271937 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:13:23.271949 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:13:23.271994 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:13:23.272014 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:13:23.272032 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:13:23.272044 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:13:23.272059 systemd[1]: Successfully loaded SELinux policy in 53.322ms. Feb 9 09:13:23.272083 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.012ms. Feb 9 09:13:23.272099 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:13:23.272113 systemd[1]: Detected virtualization kvm. Feb 9 09:13:23.272126 systemd[1]: Detected architecture x86-64. Feb 9 09:13:23.272139 systemd[1]: Detected first boot. Feb 9 09:13:23.272156 systemd[1]: Hostname set to . Feb 9 09:13:23.272169 systemd[1]: Initializing machine ID from VM UUID. Feb 9 09:13:23.272183 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:13:23.272196 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:13:23.272209 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:13:23.272224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:13:23.272238 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:13:23.272255 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:13:23.272268 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:13:23.272287 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:13:23.272300 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:13:23.272321 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:13:23.272335 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 09:13:23.272347 systemd[1]: Created slice system-getty.slice. Feb 9 09:13:23.272361 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:13:23.272377 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:13:23.272391 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:13:23.272404 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:13:23.272422 systemd[1]: Created slice user.slice. Feb 9 09:13:23.272435 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:13:23.272449 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:13:23.272462 systemd[1]: Set up automount boot.automount. Feb 9 09:13:23.272476 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:13:23.272491 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:13:23.272505 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:13:23.272522 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:13:23.272534 systemd[1]: Reached target integritysetup.target. Feb 9 09:13:23.272548 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:13:23.272561 systemd[1]: Reached target remote-fs.target. Feb 9 09:13:23.272574 systemd[1]: Reached target slices.target. Feb 9 09:13:23.272587 systemd[1]: Reached target swap.target. Feb 9 09:13:23.272603 systemd[1]: Reached target torcx.target. Feb 9 09:13:23.272624 systemd[1]: Reached target veritysetup.target. Feb 9 09:13:23.272638 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:13:23.272651 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:13:23.272664 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:13:23.272677 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:13:23.272690 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:13:23.272702 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:13:23.272716 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:13:23.272732 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:13:23.272746 systemd[1]: Mounting media.mount... Feb 9 09:13:23.272794 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:13:23.272809 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:13:23.272822 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:13:23.272835 systemd[1]: Mounting tmp.mount... Feb 9 09:13:23.272849 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:13:23.272863 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:13:23.272876 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:13:23.272892 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:13:23.272905 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:13:23.272919 systemd[1]: Starting modprobe@drm.service... Feb 9 09:13:23.272933 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:13:23.272945 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:13:23.272958 systemd[1]: Starting modprobe@loop.service... Feb 9 09:13:23.272979 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:13:23.272994 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:13:23.273008 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:13:23.273025 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:13:23.273038 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:13:23.273051 systemd[1]: Stopped systemd-journald.service. Feb 9 09:13:23.273064 systemd[1]: Starting systemd-journald.service... Feb 9 09:13:23.273077 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:13:23.273090 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:13:23.273102 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:13:23.273115 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:13:23.273128 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:13:23.273144 systemd[1]: Stopped verity-setup.service. Feb 9 09:13:23.273158 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:13:23.273171 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:13:23.273184 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:13:23.273197 systemd[1]: Mounted media.mount. Feb 9 09:13:23.273209 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:13:23.273222 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:13:23.273236 systemd[1]: Mounted tmp.mount. Feb 9 09:13:23.273250 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:13:23.273280 systemd-journald[970]: Journal started Feb 9 09:13:23.273353 systemd-journald[970]: Runtime Journal (/run/log/journal/1dedd53ee3de4c1c9864cefa5d2e182d) is 4.9M, max 39.5M, 34.5M free. Feb 9 09:13:19.144000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:13:19.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:13:19.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:13:19.206000 audit: BPF prog-id=10 op=LOAD Feb 9 09:13:19.206000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:13:19.206000 audit: BPF prog-id=11 op=LOAD Feb 9 09:13:19.206000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:13:19.319000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:13:19.319000 audit[885]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:19.319000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:13:23.275839 systemd[1]: Started systemd-journald.service. Feb 9 09:13:19.321000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:13:19.321000 audit[885]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:19.321000 audit: CWD cwd="/" Feb 9 09:13:19.321000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:19.321000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:19.321000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:13:23.069000 audit: BPF prog-id=12 op=LOAD Feb 9 09:13:23.069000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:13:23.069000 audit: BPF prog-id=13 op=LOAD Feb 9 09:13:23.070000 audit: BPF prog-id=14 op=LOAD Feb 9 09:13:23.070000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:13:23.070000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:13:23.071000 audit: BPF prog-id=15 op=LOAD Feb 9 09:13:23.071000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:13:23.071000 audit: BPF prog-id=16 op=LOAD Feb 9 09:13:23.071000 audit: BPF prog-id=17 op=LOAD Feb 9 09:13:23.071000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:13:23.071000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:13:23.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.083000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:13:23.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.217000 audit: BPF prog-id=18 op=LOAD Feb 9 09:13:23.218000 audit: BPF prog-id=19 op=LOAD Feb 9 09:13:23.218000 audit: BPF prog-id=20 op=LOAD Feb 9 09:13:23.218000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:13:23.218000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:13:23.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.269000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:13:23.269000 audit[970]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcaf389230 a2=4000 a3=7ffcaf3892cc items=0 ppid=1 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:23.269000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:13:23.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.068472 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:13:19.316015 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:13:23.068492 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 09:13:19.316857 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:13:23.073363 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:13:19.316894 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:13:23.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.277457 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:13:19.316976 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:13:23.277629 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:13:19.316995 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:13:23.278439 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:13:19.317058 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:13:23.278625 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:13:19.317083 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:13:23.280282 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:13:19.317430 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:13:23.280450 systemd[1]: Finished modprobe@drm.service. Feb 9 09:13:19.317497 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:13:23.281314 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:13:19.317519 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:13:23.281480 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:13:19.318424 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:13:23.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:19.318487 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:13:23.283552 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:13:19.318522 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:13:23.285329 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:13:19.318549 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:13:19.318582 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:13:19.318607 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:13:23.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:22.510328 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:13:23.290360 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:13:22.511017 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:13:23.290942 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:13:22.511158 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:13:23.296128 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:13:22.511468 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:13:23.298499 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:13:22.511545 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:13:23.299199 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:13:22.511660 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-02-09T09:13:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:13:23.302254 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:13:23.313189 systemd-journald[970]: Time spent on flushing to /var/log/journal/1dedd53ee3de4c1c9864cefa5d2e182d is 63.485ms for 1140 entries. Feb 9 09:13:23.313189 systemd-journald[970]: System Journal (/var/log/journal/1dedd53ee3de4c1c9864cefa5d2e182d) is 8.0M, max 195.6M, 187.6M free. Feb 9 09:13:23.465768 systemd-journald[970]: Received client request to flush runtime journal. Feb 9 09:13:23.465925 kernel: loop: module loaded Feb 9 09:13:23.465969 kernel: fuse: init (API version 7.34) Feb 9 09:13:23.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.306484 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:13:23.313344 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:13:23.316611 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:13:23.317510 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:13:23.318478 systemd[1]: Reached target network-pre.target. Feb 9 09:13:23.326430 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:13:23.343445 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:13:23.344318 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:13:23.391536 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:13:23.391740 systemd[1]: Finished modprobe@loop.service. Feb 9 09:13:23.451826 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:13:23.454650 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:13:23.454896 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:13:23.459475 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:13:23.460231 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:13:23.462363 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:13:23.466294 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:13:23.471014 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:13:23.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.478046 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:13:23.521309 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:13:23.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.530557 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:13:23.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:23.532997 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:13:23.547595 udevadm[998]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 09:13:24.052600 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:13:24.085085 kernel: kauditd_printk_skb: 103 callbacks suppressed Feb 9 09:13:24.085300 kernel: audit: type=1130 audit(1707470004.078:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.086974 kernel: audit: type=1334 audit(1707470004.080:144): prog-id=21 op=LOAD Feb 9 09:13:24.080000 audit: BPF prog-id=21 op=LOAD Feb 9 09:13:24.086278 systemd[1]: Starting systemd-udevd.service... Feb 9 09:13:24.084000 audit: BPF prog-id=22 op=LOAD Feb 9 09:13:24.084000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:13:24.084000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:13:24.087799 kernel: audit: type=1334 audit(1707470004.084:145): prog-id=22 op=LOAD Feb 9 09:13:24.087840 kernel: audit: type=1334 audit(1707470004.084:146): prog-id=7 op=UNLOAD Feb 9 09:13:24.087869 kernel: audit: type=1334 audit(1707470004.084:147): prog-id=8 op=UNLOAD Feb 9 09:13:24.113011 systemd-udevd[999]: Using default interface naming scheme 'v252'. Feb 9 09:13:24.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.181892 kernel: audit: type=1130 audit(1707470004.175:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.176041 systemd[1]: Started systemd-udevd.service. Feb 9 09:13:24.182736 systemd[1]: Starting systemd-networkd.service... Feb 9 09:13:24.180000 audit: BPF prog-id=23 op=LOAD Feb 9 09:13:24.187806 kernel: audit: type=1334 audit(1707470004.180:149): prog-id=23 op=LOAD Feb 9 09:13:24.199250 kernel: audit: type=1334 audit(1707470004.193:150): prog-id=24 op=LOAD Feb 9 09:13:24.199430 kernel: audit: type=1334 audit(1707470004.195:151): prog-id=25 op=LOAD Feb 9 09:13:24.199468 kernel: audit: type=1334 audit(1707470004.196:152): prog-id=26 op=LOAD Feb 9 09:13:24.193000 audit: BPF prog-id=24 op=LOAD Feb 9 09:13:24.195000 audit: BPF prog-id=25 op=LOAD Feb 9 09:13:24.196000 audit: BPF prog-id=26 op=LOAD Feb 9 09:13:24.199144 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:13:24.264401 systemd[1]: Started systemd-userdbd.service. Feb 9 09:13:24.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.280381 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 09:13:24.310484 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:13:24.310669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:13:24.312506 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:13:24.317311 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:13:24.319986 systemd[1]: Starting modprobe@loop.service... Feb 9 09:13:24.320610 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:13:24.320745 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:13:24.320934 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 09:13:24.321720 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:13:24.322460 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:13:24.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.330454 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:13:24.330636 systemd[1]: Finished modprobe@loop.service. Feb 9 09:13:24.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.331441 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:13:24.332149 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:13:24.332385 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:13:24.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.333130 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:13:24.411867 systemd-networkd[1000]: lo: Link UP Feb 9 09:13:24.412360 systemd-networkd[1000]: lo: Gained carrier Feb 9 09:13:24.426865 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 09:13:24.431791 kernel: ACPI: button: Power Button [PWRF] Feb 9 09:13:24.433951 systemd-networkd[1000]: Enumeration completed Feb 9 09:13:24.434131 systemd-networkd[1000]: eth1: Configuring with /run/systemd/network/10-2a:9c:73:1b:cf:c7.network. Feb 9 09:13:24.434445 systemd[1]: Started systemd-networkd.service. Feb 9 09:13:24.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.436844 systemd-networkd[1000]: eth0: Configuring with /run/systemd/network/10-1e:a5:da:e5:ed:66.network. Feb 9 09:13:24.438142 systemd-networkd[1000]: eth1: Link UP Feb 9 09:13:24.438263 systemd-networkd[1000]: eth1: Gained carrier Feb 9 09:13:24.443248 systemd-networkd[1000]: eth0: Link UP Feb 9 09:13:24.443262 systemd-networkd[1000]: eth0: Gained carrier Feb 9 09:13:24.431000 audit[1002]: AVC avc: denied { confidentiality } for pid=1002 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:13:24.431000 audit[1002]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562317caa7b0 a1=32194 a2=7f7b72eabbc5 a3=5 items=108 ppid=999 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:24.431000 audit: CWD cwd="/" Feb 9 09:13:24.431000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=1 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=2 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=3 name=(null) inode=14338 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=4 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=5 name=(null) inode=14339 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=6 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=7 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=8 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=9 name=(null) inode=14341 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=10 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=11 name=(null) inode=14342 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=12 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=13 name=(null) inode=14343 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=14 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=15 name=(null) inode=14344 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=16 name=(null) inode=14340 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=17 name=(null) inode=14345 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=18 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=19 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=20 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=21 name=(null) inode=14347 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=22 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=23 name=(null) inode=14348 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=24 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=25 name=(null) inode=14349 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=26 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=27 name=(null) inode=14350 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=28 name=(null) inode=14346 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=29 name=(null) inode=14351 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=30 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=31 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=32 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=33 name=(null) inode=14353 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=34 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=35 name=(null) inode=14354 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=36 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=37 name=(null) inode=14355 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=38 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=39 name=(null) inode=14356 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=40 name=(null) inode=14352 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=41 name=(null) inode=14357 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=42 name=(null) inode=14337 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=43 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=44 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=45 name=(null) inode=14359 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=46 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=47 name=(null) inode=14360 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=48 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=49 name=(null) inode=14361 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=50 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=51 name=(null) inode=14362 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=52 name=(null) inode=14358 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=53 name=(null) inode=14363 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=55 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=56 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=57 name=(null) inode=14365 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=58 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=59 name=(null) inode=14366 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=60 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=61 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=62 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=63 name=(null) inode=14368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=64 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=65 name=(null) inode=14369 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=66 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=67 name=(null) inode=14370 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=68 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=69 name=(null) inode=14371 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=70 name=(null) inode=14367 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=71 name=(null) inode=14372 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=72 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=73 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=74 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=75 name=(null) inode=14374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=76 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=77 name=(null) inode=14375 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=78 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=79 name=(null) inode=14376 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=80 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=81 name=(null) inode=14377 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=82 name=(null) inode=14373 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=83 name=(null) inode=14378 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=84 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=85 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=86 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=87 name=(null) inode=14380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=88 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=89 name=(null) inode=14381 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=90 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=91 name=(null) inode=14382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=92 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=93 name=(null) inode=14383 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=94 name=(null) inode=14379 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=95 name=(null) inode=14384 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=96 name=(null) inode=14364 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=97 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=98 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=99 name=(null) inode=14386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=100 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=101 name=(null) inode=14387 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=102 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=103 name=(null) inode=14388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=104 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=105 name=(null) inode=14389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=106 name=(null) inode=14385 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PATH item=107 name=(null) inode=14390 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:13:24.431000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:13:24.505792 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 09:13:24.526547 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 09:13:24.527021 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:13:24.538615 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:13:24.698801 kernel: EDAC MC: Ver: 3.0.0 Feb 9 09:13:24.715510 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:13:24.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.717887 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:13:24.738327 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:13:24.770458 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:13:24.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.771443 systemd[1]: Reached target cryptsetup.target. Feb 9 09:13:24.773804 systemd[1]: Starting lvm2-activation.service... Feb 9 09:13:24.780857 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:13:24.805223 systemd[1]: Finished lvm2-activation.service. Feb 9 09:13:24.805957 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:13:24.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.808599 systemd[1]: Mounting media-configdrive.mount... Feb 9 09:13:24.809273 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:13:24.809338 systemd[1]: Reached target machines.target. Feb 9 09:13:24.811464 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:13:24.826340 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:13:24.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.830105 kernel: ISO 9660 Extensions: RRIP_1991A Feb 9 09:13:24.831777 systemd[1]: Mounted media-configdrive.mount. Feb 9 09:13:24.832392 systemd[1]: Reached target local-fs.target. Feb 9 09:13:24.834415 systemd[1]: Starting ldconfig.service... Feb 9 09:13:24.835732 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:13:24.835816 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:13:24.837705 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:13:24.840642 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:13:24.841671 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:13:24.841744 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:13:24.846146 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:13:24.852642 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Feb 9 09:13:24.854493 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:13:24.873485 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:13:24.875661 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:13:24.881407 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:13:24.994481 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:13:24.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:24.997491 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:13:25.014164 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Feb 9 09:13:25.014164 systemd-fsck[1050]: /dev/vda1: 789 files, 115332/258078 clusters Feb 9 09:13:25.024691 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:13:25.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.029932 systemd[1]: Mounting boot.mount... Feb 9 09:13:25.049973 systemd[1]: Mounted boot.mount. Feb 9 09:13:25.082858 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:13:25.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.247894 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:13:25.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.250405 systemd[1]: Starting audit-rules.service... Feb 9 09:13:25.252949 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:13:25.256972 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:13:25.259000 audit: BPF prog-id=27 op=LOAD Feb 9 09:13:25.263350 systemd[1]: Starting systemd-resolved.service... Feb 9 09:13:25.267000 audit: BPF prog-id=28 op=LOAD Feb 9 09:13:25.269518 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:13:25.272928 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:13:25.287883 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:13:25.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.288726 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:13:25.295000 audit[1059]: SYSTEM_BOOT pid=1059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.300966 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:13:25.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.324401 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:13:25.336728 systemd[1]: Finished ldconfig.service. Feb 9 09:13:25.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.347465 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:13:25.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.350522 systemd[1]: Starting systemd-update-done.service... Feb 9 09:13:25.375457 systemd[1]: Finished systemd-update-done.service. Feb 9 09:13:25.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:25.391000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:13:25.391000 audit[1074]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcba93ccd0 a2=420 a3=0 items=0 ppid=1053 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:25.391000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:13:25.392366 augenrules[1074]: No rules Feb 9 09:13:25.393709 systemd[1]: Finished audit-rules.service. Feb 9 09:13:25.413384 systemd-resolved[1056]: Positive Trust Anchors: Feb 9 09:13:25.413401 systemd-resolved[1056]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:13:25.413431 systemd-resolved[1056]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:13:25.420490 systemd-resolved[1056]: Using system hostname 'ci-3510.3.2-9-0cc2ab7272'. Feb 9 09:13:25.422969 systemd[1]: Started systemd-resolved.service. Feb 9 09:13:25.423789 systemd[1]: Reached target network.target. Feb 9 09:13:25.424272 systemd[1]: Reached target nss-lookup.target. Feb 9 09:13:25.424715 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:13:25.425321 systemd[1]: Reached target sysinit.target. Feb 9 09:13:25.425963 systemd[1]: Started motdgen.path. Feb 9 09:13:25.426529 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:13:25.427089 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:13:25.427612 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:13:25.427651 systemd[1]: Reached target paths.target. Feb 9 09:13:25.428173 systemd[1]: Reached target time-set.target. Feb 9 09:13:25.428860 systemd[1]: Started logrotate.timer. Feb 9 09:13:25.429694 systemd[1]: Started mdadm.timer. Feb 9 09:13:25.430176 systemd[1]: Reached target timers.target. Feb 9 09:13:25.435025 systemd[1]: Listening on dbus.socket. Feb 9 09:13:25.437891 systemd[1]: Starting docker.socket... Feb 9 09:13:25.444193 systemd[1]: Listening on sshd.socket. Feb 9 09:13:25.445111 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:13:25.445999 systemd[1]: Listening on docker.socket. Feb 9 09:13:25.446918 systemd-networkd[1000]: eth0: Gained IPv6LL Feb 9 09:13:25.447118 systemd[1]: Reached target sockets.target. Feb 9 09:13:25.461114 systemd[1]: Reached target basic.target. Feb 9 09:13:25.461952 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:13:25.462016 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:13:25.464402 systemd[1]: Starting containerd.service... Feb 9 09:13:25.467290 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 09:13:25.470419 systemd[1]: Starting dbus.service... Feb 9 09:13:25.476163 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:13:25.481603 systemd[1]: Starting extend-filesystems.service... Feb 9 09:13:25.484960 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:13:25.487338 systemd[1]: Starting motdgen.service... Feb 9 09:13:25.489511 jq[1087]: false Feb 9 09:13:25.492032 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:13:25.498140 systemd[1]: Starting prepare-critools.service... Feb 9 09:13:25.503199 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:13:25.509862 systemd[1]: Starting sshd-keygen.service... Feb 9 09:13:25.517955 systemd[1]: Starting systemd-logind.service... Feb 9 09:13:25.518720 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:13:25.518891 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:13:25.518999 extend-filesystems[1088]: Found vda Feb 9 09:13:25.519884 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:13:25.521836 extend-filesystems[1088]: Found vda1 Feb 9 09:13:25.523364 extend-filesystems[1088]: Found vda2 Feb 9 09:13:25.523988 extend-filesystems[1088]: Found vda3 Feb 9 09:13:25.524603 extend-filesystems[1088]: Found usr Feb 9 09:13:25.525333 systemd[1]: Starting update-engine.service... Feb 9 09:13:25.530106 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:13:25.537201 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:13:25.537853 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:13:25.538851 extend-filesystems[1088]: Found vda4 Feb 9 09:13:25.538851 extend-filesystems[1088]: Found vda6 Feb 9 09:13:25.538851 extend-filesystems[1088]: Found vda7 Feb 9 09:13:25.538851 extend-filesystems[1088]: Found vda9 Feb 9 09:13:25.538851 extend-filesystems[1088]: Checking size of /dev/vda9 Feb 9 09:13:25.590980 jq[1100]: true Feb 9 09:13:25.580794 systemd[1]: Started dbus.service. Feb 9 09:13:25.580464 dbus-daemon[1085]: [system] SELinux support is enabled Feb 9 09:13:25.584584 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:13:25.584630 systemd[1]: Reached target system-config.target. Feb 9 09:13:25.603919 tar[1103]: ./ Feb 9 09:13:25.603919 tar[1103]: ./macvlan Feb 9 09:13:25.585461 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:13:25.589722 systemd[1]: Starting user-configdrive.service... Feb 9 09:13:25.606888 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:13:25.614406 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:13:25.620792 tar[1104]: crictl Feb 9 09:13:25.638928 systemd-networkd[1000]: eth1: Gained IPv6LL Feb 9 09:13:25.670421 extend-filesystems[1088]: Resized partition /dev/vda9 Feb 9 09:13:26.979517 jq[1118]: true Feb 9 09:13:26.979266 systemd-timesyncd[1058]: Contacted time server 152.70.159.102:123 (0.flatcar.pool.ntp.org). Feb 9 09:13:26.979368 systemd-timesyncd[1058]: Initial clock synchronization to Fri 2024-02-09 09:13:26.978956 UTC. Feb 9 09:13:26.980071 systemd-resolved[1056]: Clock change detected. Flushing caches. Feb 9 09:13:26.992894 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:13:26.993190 systemd[1]: Finished motdgen.service. Feb 9 09:13:26.998889 extend-filesystems[1127]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 09:13:27.025962 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 9 09:13:27.054737 update_engine[1099]: I0209 09:13:27.052793 1099 main.cc:92] Flatcar Update Engine starting Feb 9 09:13:27.064921 update_engine[1099]: I0209 09:13:27.064869 1099 update_check_scheduler.cc:74] Next update check in 10m39s Feb 9 09:13:27.064928 systemd[1]: Started update-engine.service. Feb 9 09:13:27.068596 systemd[1]: Started locksmithd.service. Feb 9 09:13:27.076721 systemd[1]: Created slice system-sshd.slice. Feb 9 09:13:27.079685 coreos-cloudinit[1113]: 2024/02/09 09:13:27 Checking availability of "cloud-drive" Feb 9 09:13:27.080427 coreos-cloudinit[1113]: 2024/02/09 09:13:27 Fetching user-data from datasource of type "cloud-drive" Feb 9 09:13:27.080427 coreos-cloudinit[1113]: 2024/02/09 09:13:27 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 9 09:13:27.082327 coreos-cloudinit[1113]: 2024/02/09 09:13:27 Fetching meta-data from datasource of type "cloud-drive" Feb 9 09:13:27.082327 coreos-cloudinit[1113]: 2024/02/09 09:13:27 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 9 09:13:27.093186 coreos-cloudinit[1113]: Detected an Ignition config. Exiting... Feb 9 09:13:27.093886 systemd[1]: Finished user-configdrive.service. Feb 9 09:13:27.094864 systemd[1]: Reached target user-config.target. Feb 9 09:13:27.166778 bash[1146]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:13:27.168030 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:13:27.259578 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 9 09:13:27.283851 extend-filesystems[1127]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 09:13:27.283851 extend-filesystems[1127]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 9 09:13:27.283851 extend-filesystems[1127]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 9 09:13:27.287554 extend-filesystems[1088]: Resized filesystem in /dev/vda9 Feb 9 09:13:27.287554 extend-filesystems[1088]: Found vdb Feb 9 09:13:27.288050 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:13:27.288248 systemd[1]: Finished extend-filesystems.service. Feb 9 09:13:27.295499 env[1105]: time="2024-02-09T09:13:27.295405011Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:13:27.321358 systemd-logind[1097]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 09:13:27.323832 systemd-logind[1097]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 09:13:27.324703 systemd-logind[1097]: New seat seat0. Feb 9 09:13:27.334935 systemd[1]: Started systemd-logind.service. Feb 9 09:13:27.346272 tar[1103]: ./static Feb 9 09:13:27.350691 coreos-metadata[1083]: Feb 09 09:13:27.350 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:13:27.367903 coreos-metadata[1083]: Feb 09 09:13:27.367 INFO Fetch successful Feb 9 09:13:27.386220 unknown[1083]: wrote ssh authorized keys file for user: core Feb 9 09:13:27.397498 env[1105]: time="2024-02-09T09:13:27.397411723Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:13:27.398516 env[1105]: time="2024-02-09T09:13:27.398468206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.401857 update-ssh-keys[1152]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:13:27.402393 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 09:13:27.406295 env[1105]: time="2024-02-09T09:13:27.406201684Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:13:27.407404 env[1105]: time="2024-02-09T09:13:27.407350840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.408010 env[1105]: time="2024-02-09T09:13:27.407963694Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:13:27.409632 env[1105]: time="2024-02-09T09:13:27.409585720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.409801 env[1105]: time="2024-02-09T09:13:27.409772407Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:13:27.409900 env[1105]: time="2024-02-09T09:13:27.409878112Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.410181 env[1105]: time="2024-02-09T09:13:27.410150695Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.410773 env[1105]: time="2024-02-09T09:13:27.410739947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:13:27.413131 env[1105]: time="2024-02-09T09:13:27.413087285Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:13:27.413131 env[1105]: time="2024-02-09T09:13:27.413125319Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:13:27.413269 env[1105]: time="2024-02-09T09:13:27.413236201Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:13:27.413269 env[1105]: time="2024-02-09T09:13:27.413252147Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:13:27.418311 env[1105]: time="2024-02-09T09:13:27.418246566Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:13:27.418311 env[1105]: time="2024-02-09T09:13:27.418305237Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:13:27.418311 env[1105]: time="2024-02-09T09:13:27.418322119Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418366300Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418383605Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418398833Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418412359Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418426430Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418439759Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418454035Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418467598Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.418653 env[1105]: time="2024-02-09T09:13:27.418481716Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:13:27.419029 env[1105]: time="2024-02-09T09:13:27.418669875Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:13:27.419029 env[1105]: time="2024-02-09T09:13:27.418762226Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:13:27.419113 env[1105]: time="2024-02-09T09:13:27.419047979Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:13:27.419113 env[1105]: time="2024-02-09T09:13:27.419079911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419113 env[1105]: time="2024-02-09T09:13:27.419096367Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419161055Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419175579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419190071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419202917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419218015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419240 env[1105]: time="2024-02-09T09:13:27.419231413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419243602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419255961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419270147Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419431683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419447126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419458 env[1105]: time="2024-02-09T09:13:27.419460802Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419723 env[1105]: time="2024-02-09T09:13:27.419474556Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:13:27.419723 env[1105]: time="2024-02-09T09:13:27.419492247Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:13:27.419723 env[1105]: time="2024-02-09T09:13:27.419506123Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:13:27.419723 env[1105]: time="2024-02-09T09:13:27.419545221Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:13:27.419723 env[1105]: time="2024-02-09T09:13:27.419591093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:13:27.419921 env[1105]: time="2024-02-09T09:13:27.419818891Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:13:27.419921 env[1105]: time="2024-02-09T09:13:27.419883604Z" level=info msg="Connect containerd service" Feb 9 09:13:27.422285 env[1105]: time="2024-02-09T09:13:27.419932288Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:13:27.422285 env[1105]: time="2024-02-09T09:13:27.421186163Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:13:27.422285 env[1105]: time="2024-02-09T09:13:27.421339943Z" level=info msg="Start subscribing containerd event" Feb 9 09:13:27.422285 env[1105]: time="2024-02-09T09:13:27.422156312Z" level=info msg="Start recovering state" Feb 9 09:13:27.422478 env[1105]: time="2024-02-09T09:13:27.422289369Z" level=info msg="Start event monitor" Feb 9 09:13:27.422478 env[1105]: time="2024-02-09T09:13:27.422311810Z" level=info msg="Start snapshots syncer" Feb 9 09:13:27.422478 env[1105]: time="2024-02-09T09:13:27.422329627Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:13:27.422478 env[1105]: time="2024-02-09T09:13:27.422342641Z" level=info msg="Start streaming server" Feb 9 09:13:27.423070 env[1105]: time="2024-02-09T09:13:27.423028219Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:13:27.423186 env[1105]: time="2024-02-09T09:13:27.423155546Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:13:27.423398 systemd[1]: Started containerd.service. Feb 9 09:13:27.426347 env[1105]: time="2024-02-09T09:13:27.424322937Z" level=info msg="containerd successfully booted in 0.152439s" Feb 9 09:13:27.436710 tar[1103]: ./vlan Feb 9 09:13:27.525943 tar[1103]: ./portmap Feb 9 09:13:27.597605 tar[1103]: ./host-local Feb 9 09:13:27.672504 tar[1103]: ./vrf Feb 9 09:13:27.737585 tar[1103]: ./bridge Feb 9 09:13:27.850831 tar[1103]: ./tuning Feb 9 09:13:27.916728 tar[1103]: ./firewall Feb 9 09:13:28.011585 tar[1103]: ./host-device Feb 9 09:13:28.092482 tar[1103]: ./sbr Feb 9 09:13:28.148903 tar[1103]: ./loopback Feb 9 09:13:28.172207 systemd[1]: Finished prepare-critools.service. Feb 9 09:13:28.193499 tar[1103]: ./dhcp Feb 9 09:13:28.305421 tar[1103]: ./ptp Feb 9 09:13:28.358298 tar[1103]: ./ipvlan Feb 9 09:13:28.408102 tar[1103]: ./bandwidth Feb 9 09:13:28.470390 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:13:28.494435 locksmithd[1135]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:13:28.504848 sshd_keygen[1114]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:13:28.532782 systemd[1]: Finished sshd-keygen.service. Feb 9 09:13:28.535214 systemd[1]: Starting issuegen.service... Feb 9 09:13:28.537148 systemd[1]: Started sshd@0-24.144.85.89:22-139.178.89.65:48518.service. Feb 9 09:13:28.546652 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:13:28.546961 systemd[1]: Finished issuegen.service. Feb 9 09:13:28.550460 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:13:28.562726 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:13:28.565613 systemd[1]: Started getty@tty1.service. Feb 9 09:13:28.568326 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 09:13:28.569400 systemd[1]: Reached target getty.target. Feb 9 09:13:28.570205 systemd[1]: Reached target multi-user.target. Feb 9 09:13:28.574836 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:13:28.584985 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:13:28.585224 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:13:28.585932 systemd[1]: Startup finished in 1.011s (kernel) + 6.361s (initrd) + 8.207s (userspace) = 15.581s. Feb 9 09:13:28.622295 sshd[1170]: Accepted publickey for core from 139.178.89.65 port 48518 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:28.626221 sshd[1170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:28.642522 systemd[1]: Created slice user-500.slice. Feb 9 09:13:28.644419 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:13:28.650216 systemd-logind[1097]: New session 1 of user core. Feb 9 09:13:28.657651 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:13:28.660142 systemd[1]: Starting user@500.service... Feb 9 09:13:28.665029 (systemd)[1180]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:28.757934 systemd[1180]: Queued start job for default target default.target. Feb 9 09:13:28.758901 systemd[1180]: Reached target paths.target. Feb 9 09:13:28.759214 systemd[1180]: Reached target sockets.target. Feb 9 09:13:28.759252 systemd[1180]: Reached target timers.target. Feb 9 09:13:28.759266 systemd[1180]: Reached target basic.target. Feb 9 09:13:28.759492 systemd[1180]: Reached target default.target. Feb 9 09:13:28.759570 systemd[1180]: Startup finished in 85ms. Feb 9 09:13:28.760056 systemd[1]: Started user@500.service. Feb 9 09:13:28.762613 systemd[1]: Started session-1.scope. Feb 9 09:13:28.830872 systemd[1]: Started sshd@1-24.144.85.89:22-139.178.89.65:55972.service. Feb 9 09:13:28.880897 sshd[1189]: Accepted publickey for core from 139.178.89.65 port 55972 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:28.883879 sshd[1189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:28.891146 systemd-logind[1097]: New session 2 of user core. Feb 9 09:13:28.892871 systemd[1]: Started session-2.scope. Feb 9 09:13:28.963515 sshd[1189]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:28.971499 systemd[1]: Started sshd@2-24.144.85.89:22-139.178.89.65:55988.service. Feb 9 09:13:28.974673 systemd-logind[1097]: Session 2 logged out. Waiting for processes to exit. Feb 9 09:13:28.975525 systemd[1]: sshd@1-24.144.85.89:22-139.178.89.65:55972.service: Deactivated successfully. Feb 9 09:13:28.976735 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 09:13:28.978284 systemd-logind[1097]: Removed session 2. Feb 9 09:13:29.020981 sshd[1194]: Accepted publickey for core from 139.178.89.65 port 55988 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:29.023658 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:29.030269 systemd-logind[1097]: New session 3 of user core. Feb 9 09:13:29.031827 systemd[1]: Started session-3.scope. Feb 9 09:13:29.093090 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:29.098525 systemd[1]: sshd@2-24.144.85.89:22-139.178.89.65:55988.service: Deactivated successfully. Feb 9 09:13:29.099467 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 09:13:29.100300 systemd-logind[1097]: Session 3 logged out. Waiting for processes to exit. Feb 9 09:13:29.101969 systemd[1]: Started sshd@3-24.144.85.89:22-139.178.89.65:55994.service. Feb 9 09:13:29.103705 systemd-logind[1097]: Removed session 3. Feb 9 09:13:29.149034 sshd[1201]: Accepted publickey for core from 139.178.89.65 port 55994 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:29.151769 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:29.159573 systemd[1]: Started session-4.scope. Feb 9 09:13:29.160040 systemd-logind[1097]: New session 4 of user core. Feb 9 09:13:29.230126 sshd[1201]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:29.237078 systemd[1]: Started sshd@4-24.144.85.89:22-139.178.89.65:55996.service. Feb 9 09:13:29.237910 systemd[1]: sshd@3-24.144.85.89:22-139.178.89.65:55994.service: Deactivated successfully. Feb 9 09:13:29.239074 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:13:29.241123 systemd-logind[1097]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:13:29.243118 systemd-logind[1097]: Removed session 4. Feb 9 09:13:29.287431 sshd[1206]: Accepted publickey for core from 139.178.89.65 port 55996 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:29.290145 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:29.296913 systemd[1]: Started session-5.scope. Feb 9 09:13:29.297513 systemd-logind[1097]: New session 5 of user core. Feb 9 09:13:29.372196 sudo[1210]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:13:29.373028 sudo[1210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:13:29.381899 dbus-daemon[1085]: \xd0\u001d\u0008\x8e3V: received setenforce notice (enforcing=-1135850432) Feb 9 09:13:29.383858 sudo[1210]: pam_unix(sudo:session): session closed for user root Feb 9 09:13:29.389084 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:29.396487 systemd-logind[1097]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:13:29.398055 systemd[1]: sshd@4-24.144.85.89:22-139.178.89.65:55996.service: Deactivated successfully. Feb 9 09:13:29.399422 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:13:29.402091 systemd[1]: Started sshd@5-24.144.85.89:22-139.178.89.65:56008.service. Feb 9 09:13:29.403922 systemd-logind[1097]: Removed session 5. Feb 9 09:13:29.450917 sshd[1214]: Accepted publickey for core from 139.178.89.65 port 56008 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:29.453219 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:29.459709 systemd-logind[1097]: New session 6 of user core. Feb 9 09:13:29.460196 systemd[1]: Started session-6.scope. Feb 9 09:13:29.525034 sudo[1218]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:13:29.525399 sudo[1218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:13:29.530639 sudo[1218]: pam_unix(sudo:session): session closed for user root Feb 9 09:13:29.538396 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:13:29.539195 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:13:29.553378 systemd[1]: Stopping audit-rules.service... Feb 9 09:13:29.553000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:13:29.553000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8eda74a0 a2=420 a3=0 items=0 ppid=1 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:29.553000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:13:29.556349 auditctl[1221]: No rules Feb 9 09:13:29.555922 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:13:29.556192 systemd[1]: Stopped audit-rules.service. Feb 9 09:13:29.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.558803 systemd[1]: Starting audit-rules.service... Feb 9 09:13:29.587106 augenrules[1238]: No rules Feb 9 09:13:29.588905 systemd[1]: Finished audit-rules.service. Feb 9 09:13:29.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.589000 audit[1217]: USER_END pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.589000 audit[1217]: CRED_DISP pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.590830 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 9 09:13:29.594981 sshd[1214]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:29.595000 audit[1214]: USER_END pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.596000 audit[1214]: CRED_DISP pid=1214 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.600969 systemd[1]: sshd@5-24.144.85.89:22-139.178.89.65:56008.service: Deactivated successfully. Feb 9 09:13:29.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-24.144.85.89:22-139.178.89.65:56008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.602096 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:13:29.603127 systemd-logind[1097]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:13:29.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-24.144.85.89:22-139.178.89.65:56024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.605352 systemd[1]: Started sshd@6-24.144.85.89:22-139.178.89.65:56024.service. Feb 9 09:13:29.614031 systemd-logind[1097]: Removed session 6. Feb 9 09:13:29.652000 audit[1244]: USER_ACCT pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.654238 sshd[1244]: Accepted publickey for core from 139.178.89.65 port 56024 ssh2: RSA SHA256:tYqkVl2fzK3huJ7WtiyBwFEU/SSbCW+NkWaODVzheTk Feb 9 09:13:29.654000 audit[1244]: CRED_ACQ pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.654000 audit[1244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d64f090 a2=3 a3=0 items=0 ppid=1 pid=1244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:29.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:13:29.656410 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:13:29.662495 systemd-logind[1097]: New session 7 of user core. Feb 9 09:13:29.663348 systemd[1]: Started session-7.scope. Feb 9 09:13:29.668000 audit[1244]: USER_START pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.670000 audit[1246]: CRED_ACQ pid=1246 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:29.724000 audit[1247]: USER_ACCT pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.726226 sudo[1247]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:13:29.725000 audit[1247]: CRED_REFR pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:29.726925 sudo[1247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:13:29.728000 audit[1247]: USER_START pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:30.299823 systemd[1]: Reloading. Feb 9 09:13:30.391996 /usr/lib/systemd/system-generators/torcx-generator[1279]: time="2024-02-09T09:13:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:13:30.392041 /usr/lib/systemd/system-generators/torcx-generator[1279]: time="2024-02-09T09:13:30Z" level=info msg="torcx already run" Feb 9 09:13:30.520338 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:13:30.520687 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:13:30.556355 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.627911 kernel: kauditd_printk_skb: 160 callbacks suppressed Feb 9 09:13:30.628010 kernel: audit: type=1400 audit(1707470010.625:196): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635577 kernel: audit: type=1400 audit(1707470010.625:197): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.652825 kernel: audit: type=1400 audit(1707470010.625:198): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.653009 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:13:30.653046 kernel: audit: type=1400 audit(1707470010.625:199): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.653186 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:13:30.653218 kernel: audit: type=1400 audit(1707470010.625:200): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.653247 kernel: audit: backlog limit exceeded Feb 9 09:13:30.653282 kernel: audit: type=1400 audit(1707470010.625:201): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.657175 kernel: audit: type=1400 audit(1707470010.625:202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.630000 audit: BPF prog-id=34 op=LOAD Feb 9 09:13:30.630000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit: BPF prog-id=35 op=LOAD Feb 9 09:13:30.634000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit: BPF prog-id=36 op=LOAD Feb 9 09:13:30.634000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit: BPF prog-id=37 op=LOAD Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.635000 audit: BPF prog-id=38 op=LOAD Feb 9 09:13:30.635000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:13:30.635000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.659000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit: BPF prog-id=40 op=LOAD Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.663000 audit: BPF prog-id=41 op=LOAD Feb 9 09:13:30.663000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:13:30.663000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit: BPF prog-id=42 op=LOAD Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.666000 audit: BPF prog-id=43 op=LOAD Feb 9 09:13:30.666000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:13:30.666000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.669000 audit: BPF prog-id=44 op=LOAD Feb 9 09:13:30.669000 audit: BPF prog-id=23 op=UNLOAD Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.670000 audit: BPF prog-id=45 op=LOAD Feb 9 09:13:30.671000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit: BPF prog-id=46 op=LOAD Feb 9 09:13:30.674000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit: BPF prog-id=47 op=LOAD Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:30.674000 audit: BPF prog-id=48 op=LOAD Feb 9 09:13:30.674000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:13:30.674000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:13:30.699393 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:13:30.710663 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:13:30.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:30.711862 systemd[1]: Reached target network-online.target. Feb 9 09:13:30.714654 systemd[1]: Started kubelet.service. Feb 9 09:13:30.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:30.734292 systemd[1]: Starting coreos-metadata.service... Feb 9 09:13:30.804229 coreos-metadata[1332]: Feb 09 09:13:30.803 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 9 09:13:30.815012 kubelet[1324]: E0209 09:13:30.814746 1324 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 09:13:30.818746 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:13:30.818934 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:13:30.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:13:30.820723 coreos-metadata[1332]: Feb 09 09:13:30.820 INFO Fetch successful Feb 9 09:13:30.837521 systemd[1]: Finished coreos-metadata.service. Feb 9 09:13:30.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:31.268947 systemd[1]: Stopped kubelet.service. Feb 9 09:13:31.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:31.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:31.291302 systemd[1]: Reloading. Feb 9 09:13:31.376948 /usr/lib/systemd/system-generators/torcx-generator[1388]: time="2024-02-09T09:13:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:13:31.376981 /usr/lib/systemd/system-generators/torcx-generator[1388]: time="2024-02-09T09:13:31Z" level=info msg="torcx already run" Feb 9 09:13:31.480128 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:13:31.480154 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:13:31.502075 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.564000 audit: BPF prog-id=49 op=LOAD Feb 9 09:13:31.564000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit: BPF prog-id=50 op=LOAD Feb 9 09:13:31.567000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit: BPF prog-id=51 op=LOAD Feb 9 09:13:31.567000 audit: BPF prog-id=36 op=UNLOAD Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit: BPF prog-id=52 op=LOAD Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.567000 audit: BPF prog-id=53 op=LOAD Feb 9 09:13:31.567000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:13:31.567000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.569000 audit: BPF prog-id=54 op=LOAD Feb 9 09:13:31.569000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit: BPF prog-id=55 op=LOAD Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.570000 audit: BPF prog-id=56 op=LOAD Feb 9 09:13:31.570000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:13:31.570000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit: BPF prog-id=57 op=LOAD Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.571000 audit: BPF prog-id=58 op=LOAD Feb 9 09:13:31.571000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:13:31.571000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:13:31.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit: BPF prog-id=59 op=LOAD Feb 9 09:13:31.573000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.573000 audit: BPF prog-id=60 op=LOAD Feb 9 09:13:31.573000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit: BPF prog-id=61 op=LOAD Feb 9 09:13:31.575000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit: BPF prog-id=62 op=LOAD Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:31.576000 audit: BPF prog-id=63 op=LOAD Feb 9 09:13:31.576000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:13:31.576000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:13:31.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:31.600324 systemd[1]: Started kubelet.service. Feb 9 09:13:31.667696 kubelet[1435]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:13:31.668244 kubelet[1435]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:13:31.668492 kubelet[1435]: I0209 09:13:31.668427 1435 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:13:31.670497 kubelet[1435]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 09:13:31.670663 kubelet[1435]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:13:32.587085 kubelet[1435]: I0209 09:13:32.586947 1435 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 09:13:32.587085 kubelet[1435]: I0209 09:13:32.587068 1435 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:13:32.587452 kubelet[1435]: I0209 09:13:32.587424 1435 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 09:13:32.590549 kubelet[1435]: I0209 09:13:32.590500 1435 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:13:32.598822 kubelet[1435]: I0209 09:13:32.598756 1435 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:13:32.599180 kubelet[1435]: I0209 09:13:32.599160 1435 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:13:32.599267 kubelet[1435]: I0209 09:13:32.599254 1435 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:13:32.599424 kubelet[1435]: I0209 09:13:32.599283 1435 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:13:32.599424 kubelet[1435]: I0209 09:13:32.599302 1435 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 09:13:32.599480 kubelet[1435]: I0209 09:13:32.599437 1435 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:13:32.604484 kubelet[1435]: I0209 09:13:32.604386 1435 kubelet.go:398] "Attempting to sync node with API server" Feb 9 09:13:32.604484 kubelet[1435]: I0209 09:13:32.604421 1435 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:13:32.604484 kubelet[1435]: I0209 09:13:32.604444 1435 kubelet.go:297] "Adding apiserver pod source" Feb 9 09:13:32.604484 kubelet[1435]: I0209 09:13:32.604457 1435 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:13:32.605822 kubelet[1435]: E0209 09:13:32.605372 1435 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:32.605822 kubelet[1435]: E0209 09:13:32.605418 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:32.606478 kubelet[1435]: I0209 09:13:32.606454 1435 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:13:32.607167 kubelet[1435]: W0209 09:13:32.606901 1435 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:13:32.608018 kubelet[1435]: I0209 09:13:32.607959 1435 server.go:1186] "Started kubelet" Feb 9 09:13:32.609695 kubelet[1435]: E0209 09:13:32.609159 1435 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:13:32.609695 kubelet[1435]: E0209 09:13:32.609187 1435 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:13:32.608000 audit[1435]: AVC avc: denied { mac_admin } for pid=1435 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:32.608000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:13:32.608000 audit[1435]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fd58c0 a1=c000e14c60 a2=c000fd5890 a3=25 items=0 ppid=1 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.608000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:13:32.608000 audit[1435]: AVC avc: denied { mac_admin } for pid=1435 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:32.608000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:13:32.608000 audit[1435]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fbb1a0 a1=c000e14c78 a2=c000fd5950 a3=25 items=0 ppid=1 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.608000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:13:32.610745 kubelet[1435]: I0209 09:13:32.610323 1435 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:13:32.610745 kubelet[1435]: I0209 09:13:32.610363 1435 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:13:32.610745 kubelet[1435]: I0209 09:13:32.610429 1435 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:13:32.610745 kubelet[1435]: I0209 09:13:32.610622 1435 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:13:32.611489 kubelet[1435]: I0209 09:13:32.611464 1435 server.go:451] "Adding debug handlers to kubelet server" Feb 9 09:13:32.619123 kubelet[1435]: E0209 09:13:32.619048 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:32.619123 kubelet[1435]: I0209 09:13:32.619084 1435 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 09:13:32.619433 kubelet[1435]: I0209 09:13:32.619152 1435 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:13:32.621617 kubelet[1435]: E0209 09:13:32.621339 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee0e20823f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 607922751, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 607922751, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.627751 kubelet[1435]: E0209 09:13:32.627606 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee0e33a4d3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 609176787, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 609176787, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.628836 kubelet[1435]: W0209 09:13:32.622025 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:32.628836 kubelet[1435]: E0209 09:13:32.628793 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:32.628836 kubelet[1435]: W0209 09:13:32.622071 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:32.628836 kubelet[1435]: E0209 09:13:32.628819 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:32.629091 kubelet[1435]: W0209 09:13:32.628896 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:32.629091 kubelet[1435]: E0209 09:13:32.628909 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:32.629091 kubelet[1435]: E0209 09:13:32.628962 1435 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:32.653020 kubelet[1435]: I0209 09:13:32.652984 1435 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:13:32.653020 kubelet[1435]: I0209 09:13:32.653008 1435 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:13:32.653020 kubelet[1435]: I0209 09:13:32.653029 1435 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:13:32.657814 kubelet[1435]: E0209 09:13:32.656259 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.657814 kubelet[1435]: I0209 09:13:32.656919 1435 policy_none.go:49] "None policy: Start" Feb 9 09:13:32.659310 kubelet[1435]: I0209 09:13:32.659283 1435 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:13:32.659310 kubelet[1435]: I0209 09:13:32.659320 1435 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:13:32.659863 kubelet[1435]: E0209 09:13:32.659755 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.661048 kubelet[1435]: E0209 09:13:32.660939 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.665000 audit[1449]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.665000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde3cee420 a2=0 a3=7ffde3cee40c items=0 ppid=1435 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:13:32.667258 systemd[1]: Created slice kubepods.slice. Feb 9 09:13:32.668000 audit[1453]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.668000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe4dc36ed0 a2=0 a3=7ffe4dc36ebc items=0 ppid=1435 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:13:32.684806 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:13:32.689077 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:13:32.695908 kubelet[1435]: I0209 09:13:32.695871 1435 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:13:32.695000 audit[1435]: AVC avc: denied { mac_admin } for pid=1435 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:32.695000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:13:32.695000 audit[1435]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000efecf0 a1=c000e970f8 a2=c000efecc0 a3=25 items=0 ppid=1 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.695000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:13:32.697149 kubelet[1435]: I0209 09:13:32.697130 1435 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:13:32.698569 kubelet[1435]: E0209 09:13:32.698522 1435 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"24.144.85.89\" not found" Feb 9 09:13:32.698696 kubelet[1435]: I0209 09:13:32.698656 1435 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:13:32.671000 audit[1455]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.671000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4b3ba3b0 a2=0 a3=7ffd4b3ba39c items=0 ppid=1435 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:13:32.701000 audit[1460]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.701000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef1756190 a2=0 a3=7ffef175617c items=0 ppid=1435 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:13:32.705106 kubelet[1435]: E0209 09:13:32.705003 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee138f71af", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 699079087, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 699079087, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.720362 kubelet[1435]: I0209 09:13:32.720326 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:32.723644 kubelet[1435]: E0209 09:13:32.723492 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 720261362, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.724318 kubelet[1435]: E0209 09:13:32.723647 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:32.726889 kubelet[1435]: E0209 09:13:32.726732 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 720276955, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.733733 kubelet[1435]: E0209 09:13:32.733561 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 720279982, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.759000 audit[1465]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.759000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe6dea3b90 a2=0 a3=7ffe6dea3b7c items=0 ppid=1435 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:13:32.761000 audit[1466]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.761000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd38e02fc0 a2=0 a3=7ffd38e02fac items=0 ppid=1435 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:13:32.769000 audit[1469]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.769000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5e1584d0 a2=0 a3=7ffc5e1584bc items=0 ppid=1435 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:13:32.775000 audit[1472]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.775000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe20b0a6c0 a2=0 a3=7ffe20b0a6ac items=0 ppid=1435 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:13:32.777000 audit[1473]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.777000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9d6fc520 a2=0 a3=7ffe9d6fc50c items=0 ppid=1435 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:13:32.779000 audit[1474]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.779000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9692500 a2=0 a3=7ffde96924ec items=0 ppid=1435 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:13:32.782000 audit[1476]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.782000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdee4e2eb0 a2=0 a3=7ffdee4e2e9c items=0 ppid=1435 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:13:32.785000 audit[1478]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.785000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd49a239e0 a2=0 a3=7ffd49a239cc items=0 ppid=1435 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:13:32.814000 audit[1481]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.814000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe69eba7b0 a2=0 a3=7ffe69eba79c items=0 ppid=1435 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:13:32.819000 audit[1483]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.819000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffff1137050 a2=0 a3=7ffff113703c items=0 ppid=1435 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:13:32.832815 kubelet[1435]: E0209 09:13:32.832775 1435 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:32.834000 audit[1486]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.834000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffffd940840 a2=0 a3=7ffffd94082c items=0 ppid=1435 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:13:32.836704 kubelet[1435]: I0209 09:13:32.836636 1435 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:13:32.836000 audit[1487]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.836000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcdcde6b0 a2=0 a3=7fffcdcde69c items=0 ppid=1435 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:13:32.838000 audit[1488]: NETFILTER_CFG table=mangle:18 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.838000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdced26740 a2=0 a3=7ffdced2672c items=0 ppid=1435 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:13:32.840000 audit[1489]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.840000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd60ebb7f0 a2=0 a3=7ffd60ebb7dc items=0 ppid=1435 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:13:32.843000 audit[1490]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:13:32.843000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee47dd890 a2=0 a3=7ffee47dd87c items=0 ppid=1435 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:13:32.844000 audit[1491]: NETFILTER_CFG table=nat:21 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.844000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc1cd81ee0 a2=0 a3=7ffc1cd81ecc items=0 ppid=1435 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 09:13:32.848000 audit[1493]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.848000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffefd833300 a2=0 a3=7ffefd8332ec items=0 ppid=1435 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 09:13:32.850000 audit[1494]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.850000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffea19d3510 a2=0 a3=7ffea19d34fc items=0 ppid=1435 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:13:32.855000 audit[1496]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.855000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcee50cdb0 a2=0 a3=7ffcee50cd9c items=0 ppid=1435 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 09:13:32.857000 audit[1497]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.857000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa0c99740 a2=0 a3=7fffa0c9972c items=0 ppid=1435 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 09:13:32.860000 audit[1498]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.860000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2db71880 a2=0 a3=7ffe2db7186c items=0 ppid=1435 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:13:32.866000 audit[1500]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.866000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc1ff6e0f0 a2=0 a3=7ffc1ff6e0dc items=0 ppid=1435 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 09:13:32.870000 audit[1502]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.870000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc3a9d0a0 a2=0 a3=7ffcc3a9d08c items=0 ppid=1435 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:13:32.874000 audit[1504]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.874000 audit[1504]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff8b547350 a2=0 a3=7fff8b54733c items=0 ppid=1435 pid=1504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 09:13:32.877000 audit[1506]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.877000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe433439b0 a2=0 a3=7ffe4334399c items=0 ppid=1435 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 09:13:32.883000 audit[1508]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.883000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffdb3ff9900 a2=0 a3=7ffdb3ff98ec items=0 ppid=1435 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 09:13:32.885734 kubelet[1435]: I0209 09:13:32.885702 1435 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:13:32.885829 kubelet[1435]: I0209 09:13:32.885744 1435 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 09:13:32.885829 kubelet[1435]: I0209 09:13:32.885778 1435 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 09:13:32.885896 kubelet[1435]: E0209 09:13:32.885852 1435 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 09:13:32.886000 audit[1509]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.886000 audit[1509]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8b4a0ce0 a2=0 a3=7ffd8b4a0ccc items=0 ppid=1435 pid=1509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:13:32.889199 kubelet[1435]: W0209 09:13:32.889147 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:32.889199 kubelet[1435]: E0209 09:13:32.889200 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:32.889000 audit[1510]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.889000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07a338a0 a2=0 a3=7ffe07a3388c items=0 ppid=1435 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:13:32.891000 audit[1511]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1511 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:13:32.891000 audit[1511]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed3a5ab80 a2=0 a3=7ffed3a5ab6c items=0 ppid=1435 pid=1511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:32.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:13:32.925991 kubelet[1435]: I0209 09:13:32.925943 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:32.929688 kubelet[1435]: E0209 09:13:32.929639 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:32.929938 kubelet[1435]: E0209 09:13:32.929696 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 925874402, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:32.932454 kubelet[1435]: E0209 09:13:32.932340 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 925886316, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:33.020859 kubelet[1435]: E0209 09:13:33.020705 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 925892451, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:33.235151 kubelet[1435]: E0209 09:13:33.234901 1435 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:33.331556 kubelet[1435]: I0209 09:13:33.331497 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:33.340148 kubelet[1435]: E0209 09:13:33.340095 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:33.340486 kubelet[1435]: E0209 09:13:33.340366 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 33, 331450619, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:33.409846 kubelet[1435]: E0209 09:13:33.409722 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 33, 331459525, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:33.575839 kubelet[1435]: W0209 09:13:33.575670 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:33.576128 kubelet[1435]: E0209 09:13:33.576095 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:33.606218 kubelet[1435]: E0209 09:13:33.606077 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:33.610917 kubelet[1435]: E0209 09:13:33.610762 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 33, 331462516, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:33.811140 kubelet[1435]: W0209 09:13:33.811085 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:33.811758 kubelet[1435]: E0209 09:13:33.811741 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:33.811856 kubelet[1435]: W0209 09:13:33.811791 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:33.811941 kubelet[1435]: E0209 09:13:33.811930 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:34.038926 kubelet[1435]: E0209 09:13:34.038038 1435 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:34.141857 kubelet[1435]: I0209 09:13:34.141771 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:34.144189 kubelet[1435]: E0209 09:13:34.144121 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:34.144404 kubelet[1435]: E0209 09:13:34.144106 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 34, 141713451, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:34.146137 kubelet[1435]: E0209 09:13:34.146036 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 34, 141721607, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:34.211134 kubelet[1435]: E0209 09:13:34.210874 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 34, 141726375, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:34.451634 kubelet[1435]: W0209 09:13:34.450710 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:34.451801 kubelet[1435]: E0209 09:13:34.451768 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:34.607788 kubelet[1435]: E0209 09:13:34.607695 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:35.423387 kubelet[1435]: W0209 09:13:35.423311 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:35.423387 kubelet[1435]: E0209 09:13:35.423381 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:35.608893 kubelet[1435]: E0209 09:13:35.608798 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:35.624525 kubelet[1435]: W0209 09:13:35.624468 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:35.624957 kubelet[1435]: E0209 09:13:35.624935 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:35.640892 kubelet[1435]: E0209 09:13:35.640842 1435 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:35.746354 kubelet[1435]: I0209 09:13:35.746180 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:35.752209 kubelet[1435]: E0209 09:13:35.752162 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:35.752649 kubelet[1435]: E0209 09:13:35.752491 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 35, 746110447, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:35.754857 kubelet[1435]: E0209 09:13:35.754693 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 35, 746119773, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:35.757031 kubelet[1435]: E0209 09:13:35.756810 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 35, 746125167, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:36.364990 kubelet[1435]: W0209 09:13:36.364920 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:36.364990 kubelet[1435]: E0209 09:13:36.364989 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:36.451941 kubelet[1435]: W0209 09:13:36.451878 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:36.451941 kubelet[1435]: E0209 09:13:36.451933 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:36.609372 kubelet[1435]: E0209 09:13:36.609296 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:37.609954 kubelet[1435]: E0209 09:13:37.609836 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:38.610683 kubelet[1435]: E0209 09:13:38.610516 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:38.844587 kubelet[1435]: E0209 09:13:38.844510 1435 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "24.144.85.89" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 09:13:38.954256 kubelet[1435]: I0209 09:13:38.953770 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:38.955885 kubelet[1435]: E0209 09:13:38.955821 1435 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="24.144.85.89" Feb 9 09:13:38.957037 kubelet[1435]: E0209 09:13:38.956567 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c17685", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 24.144.85.89 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652025477, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 38, 953652212, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c17685" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:38.958791 kubelet[1435]: E0209 09:13:38.958324 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c19423", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 24.144.85.89 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652033059, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 38, 953685552, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c19423" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:38.961385 kubelet[1435]: E0209 09:13:38.961244 1435 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89.17b226ee10c1a065", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"24.144.85.89", UID:"24.144.85.89", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 24.144.85.89 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"24.144.85.89"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 13, 32, 652036197, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 13, 38, 953720220, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "24.144.85.89.17b226ee10c1a065" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:13:39.611162 kubelet[1435]: E0209 09:13:39.611076 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:40.437892 kernel: kauditd_printk_skb: 454 callbacks suppressed Feb 9 09:13:40.438084 kernel: audit: type=1130 audit(1707470020.430:582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-24.144.85.89:22-218.92.0.107:48503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:40.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-24.144.85.89:22-218.92.0.107:48503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:40.432191 systemd[1]: Started sshd@7-24.144.85.89:22-218.92.0.107:48503.service. Feb 9 09:13:40.611376 kubelet[1435]: E0209 09:13:40.611272 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:41.150736 kubelet[1435]: W0209 09:13:41.150692 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:41.150736 kubelet[1435]: E0209 09:13:41.150741 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:13:41.447000 audit[1513]: USER_AUTH pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:41.448943 sshd[1513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:13:41.453610 kernel: audit: type=1100 audit(1707470021.447:583): pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:41.612252 kubelet[1435]: E0209 09:13:41.612150 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:41.668835 kubelet[1435]: W0209 09:13:41.668773 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:41.669124 kubelet[1435]: E0209 09:13:41.669105 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:13:41.766835 kubelet[1435]: W0209 09:13:41.766118 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:41.767154 kubelet[1435]: E0209 09:13:41.767133 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "24.144.85.89" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:13:41.831107 kubelet[1435]: W0209 09:13:41.831049 1435 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:41.831303 kubelet[1435]: E0209 09:13:41.831124 1435 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:13:42.590661 kubelet[1435]: I0209 09:13:42.590589 1435 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 09:13:42.612992 kubelet[1435]: E0209 09:13:42.612936 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:42.699378 kubelet[1435]: E0209 09:13:42.699328 1435 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"24.144.85.89\" not found" Feb 9 09:13:43.019169 kubelet[1435]: E0209 09:13:43.018587 1435 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "24.144.85.89" not found Feb 9 09:13:43.221606 sshd[1513]: Failed password for root from 218.92.0.107 port 48503 ssh2 Feb 9 09:13:43.614236 kubelet[1435]: E0209 09:13:43.614170 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:44.026687 kubelet[1435]: E0209 09:13:44.026232 1435 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "24.144.85.89" not found Feb 9 09:13:44.499000 audit[1513]: USER_AUTH pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:44.505604 kernel: audit: type=1100 audit(1707470024.499:584): pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:44.614580 kubelet[1435]: E0209 09:13:44.614452 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:44.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.144.85.89:22-103.203.224.181:42850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:44.681869 systemd[1]: Started sshd@8-24.144.85.89:22-103.203.224.181:42850.service. Feb 9 09:13:44.688567 kernel: audit: type=1130 audit(1707470024.680:585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.144.85.89:22-103.203.224.181:42850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.253660 kubelet[1435]: E0209 09:13:45.253606 1435 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"24.144.85.89\" not found" node="24.144.85.89" Feb 9 09:13:45.357154 kubelet[1435]: I0209 09:13:45.357121 1435 kubelet_node_status.go:70] "Attempting to register node" node="24.144.85.89" Feb 9 09:13:45.428788 kubelet[1435]: I0209 09:13:45.428722 1435 kubelet_node_status.go:73] "Successfully registered node" node="24.144.85.89" Feb 9 09:13:45.441152 kubelet[1435]: E0209 09:13:45.441096 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:45.542593 kubelet[1435]: E0209 09:13:45.542024 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:45.615059 kubelet[1435]: E0209 09:13:45.614977 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:45.626340 sudo[1247]: pam_unix(sudo:session): session closed for user root Feb 9 09:13:45.624000 audit[1247]: USER_END pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.631601 kernel: audit: type=1106 audit(1707470025.624:586): pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.630000 audit[1247]: CRED_DISP pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.636284 sshd[1244]: pam_unix(sshd:session): session closed for user core Feb 9 09:13:45.636754 kernel: audit: type=1104 audit(1707470025.630:587): pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.640016 systemd-logind[1097]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:13:45.641234 systemd[1]: sshd@6-24.144.85.89:22-139.178.89.65:56024.service: Deactivated successfully. Feb 9 09:13:45.642391 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:13:45.636000 audit[1244]: USER_END pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:45.644576 kubelet[1435]: E0209 09:13:45.644520 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:45.648568 kernel: audit: type=1106 audit(1707470025.636:588): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:45.648913 systemd-logind[1097]: Removed session 7. Feb 9 09:13:45.636000 audit[1244]: CRED_DISP pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:45.653660 kernel: audit: type=1104 audit(1707470025.636:589): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 09:13:45.653826 kernel: audit: type=1131 audit(1707470025.640:590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-24.144.85.89:22-139.178.89.65:56024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-24.144.85.89:22-139.178.89.65:56024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:45.745180 kubelet[1435]: E0209 09:13:45.745112 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:45.846585 kubelet[1435]: E0209 09:13:45.846451 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:45.947473 kubelet[1435]: E0209 09:13:45.947388 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.048706 kubelet[1435]: E0209 09:13:46.048646 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.092095 sshd[1516]: Invalid user massoudi from 103.203.224.181 port 42850 Feb 9 09:13:46.095495 sshd[1516]: pam_faillock(sshd:auth): User unknown Feb 9 09:13:46.096285 sshd[1516]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:13:46.096334 sshd[1516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.203.224.181 Feb 9 09:13:46.096956 sshd[1516]: pam_faillock(sshd:auth): User unknown Feb 9 09:13:46.095000 audit[1516]: USER_AUTH pid=1516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="massoudi" exe="/usr/sbin/sshd" hostname=103.203.224.181 addr=103.203.224.181 terminal=ssh res=failed' Feb 9 09:13:46.102632 kernel: audit: type=1100 audit(1707470026.095:591): pid=1516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="massoudi" exe="/usr/sbin/sshd" hostname=103.203.224.181 addr=103.203.224.181 terminal=ssh res=failed' Feb 9 09:13:46.149566 kubelet[1435]: E0209 09:13:46.149398 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.250297 kubelet[1435]: E0209 09:13:46.250163 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.351740 kubelet[1435]: E0209 09:13:46.351092 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.355684 sshd[1513]: Failed password for root from 218.92.0.107 port 48503 ssh2 Feb 9 09:13:46.452113 kubelet[1435]: E0209 09:13:46.451985 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.552998 kubelet[1435]: E0209 09:13:46.552890 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.616613 kubelet[1435]: E0209 09:13:46.615903 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:46.653632 kubelet[1435]: E0209 09:13:46.653555 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.754003 kubelet[1435]: E0209 09:13:46.753912 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.855005 kubelet[1435]: E0209 09:13:46.854821 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:46.955816 kubelet[1435]: E0209 09:13:46.955220 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.056281 kubelet[1435]: E0209 09:13:47.056179 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.156680 kubelet[1435]: E0209 09:13:47.156608 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.258151 kubelet[1435]: E0209 09:13:47.257633 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.358688 kubelet[1435]: E0209 09:13:47.358591 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.459951 kubelet[1435]: E0209 09:13:47.459881 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.552000 audit[1513]: USER_AUTH pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:47.559598 kernel: audit: type=1100 audit(1707470027.552:592): pid=1513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:47.560089 kubelet[1435]: E0209 09:13:47.560030 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.617137 kubelet[1435]: E0209 09:13:47.617068 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:47.660652 kubelet[1435]: E0209 09:13:47.660591 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.761940 kubelet[1435]: E0209 09:13:47.761777 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.863708 kubelet[1435]: E0209 09:13:47.862865 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:47.890007 sshd[1516]: Failed password for invalid user massoudi from 103.203.224.181 port 42850 ssh2 Feb 9 09:13:47.964062 kubelet[1435]: E0209 09:13:47.963954 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.065147 kubelet[1435]: E0209 09:13:48.065022 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.166395 kubelet[1435]: E0209 09:13:48.165594 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.266879 kubelet[1435]: E0209 09:13:48.266765 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.367178 kubelet[1435]: E0209 09:13:48.367060 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.468263 kubelet[1435]: E0209 09:13:48.467638 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.568463 kubelet[1435]: E0209 09:13:48.568379 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.617639 kubelet[1435]: E0209 09:13:48.617571 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:48.649639 sshd[1516]: Received disconnect from 103.203.224.181 port 42850:11: Bye Bye [preauth] Feb 9 09:13:48.649639 sshd[1516]: Disconnected from invalid user massoudi 103.203.224.181 port 42850 [preauth] Feb 9 09:13:48.651211 systemd[1]: sshd@8-24.144.85.89:22-103.203.224.181:42850.service: Deactivated successfully. Feb 9 09:13:48.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.144.85.89:22-103.203.224.181:42850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:48.657892 kernel: audit: type=1131 audit(1707470028.650:593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-24.144.85.89:22-103.203.224.181:42850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:48.669283 kubelet[1435]: E0209 09:13:48.669217 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.769947 kubelet[1435]: E0209 09:13:48.769655 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.870742 kubelet[1435]: E0209 09:13:48.870674 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:48.971078 kubelet[1435]: E0209 09:13:48.970845 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.072139 kubelet[1435]: E0209 09:13:49.072068 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.172610 kubelet[1435]: E0209 09:13:49.172483 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.273820 kubelet[1435]: E0209 09:13:49.273754 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.375051 kubelet[1435]: E0209 09:13:49.374757 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.475925 kubelet[1435]: E0209 09:13:49.475859 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.576982 kubelet[1435]: E0209 09:13:49.576922 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.618141 kubelet[1435]: E0209 09:13:49.618051 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:49.678181 kubelet[1435]: E0209 09:13:49.677992 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.778682 kubelet[1435]: E0209 09:13:49.778611 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.817570 sshd[1513]: Failed password for root from 218.92.0.107 port 48503 ssh2 Feb 9 09:13:49.879899 kubelet[1435]: E0209 09:13:49.879819 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:49.980611 kubelet[1435]: E0209 09:13:49.979995 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.081002 kubelet[1435]: E0209 09:13:50.080933 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.181521 kubelet[1435]: E0209 09:13:50.181442 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.283466 kubelet[1435]: E0209 09:13:50.282581 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.383818 kubelet[1435]: E0209 09:13:50.383641 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.484870 kubelet[1435]: E0209 09:13:50.484796 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.586296 kubelet[1435]: E0209 09:13:50.586219 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.605106 sshd[1513]: Received disconnect from 218.92.0.107 port 48503:11: [preauth] Feb 9 09:13:50.605362 sshd[1513]: Disconnected from authenticating user root 218.92.0.107 port 48503 [preauth] Feb 9 09:13:50.605575 sshd[1513]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:13:50.607982 systemd[1]: sshd@7-24.144.85.89:22-218.92.0.107:48503.service: Deactivated successfully. Feb 9 09:13:50.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-24.144.85.89:22-218.92.0.107:48503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:50.614584 kernel: audit: type=1131 audit(1707470030.606:594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-24.144.85.89:22-218.92.0.107:48503 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:50.619211 kubelet[1435]: E0209 09:13:50.619135 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:50.687195 kubelet[1435]: E0209 09:13:50.687118 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.785229 systemd[1]: Started sshd@9-24.144.85.89:22-218.92.0.107:16337.service. Feb 9 09:13:50.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.144.85.89:22-218.92.0.107:16337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:50.791570 kernel: audit: type=1130 audit(1707470030.784:595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.144.85.89:22-218.92.0.107:16337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:50.791718 kubelet[1435]: E0209 09:13:50.791685 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.892638 kubelet[1435]: E0209 09:13:50.892466 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:50.993761 kubelet[1435]: E0209 09:13:50.993674 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.094005 kubelet[1435]: E0209 09:13:51.093881 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.195325 kubelet[1435]: E0209 09:13:51.194844 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.295942 kubelet[1435]: E0209 09:13:51.295833 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.396935 kubelet[1435]: E0209 09:13:51.396828 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.498007 kubelet[1435]: E0209 09:13:51.497461 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.598114 kubelet[1435]: E0209 09:13:51.598027 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.619708 kubelet[1435]: E0209 09:13:51.619620 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:51.699216 kubelet[1435]: E0209 09:13:51.699135 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.799726 kubelet[1435]: E0209 09:13:51.799351 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:51.863358 sshd[1522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:13:51.862000 audit[1522]: USER_AUTH pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:51.868611 kernel: audit: type=1100 audit(1707470031.862:596): pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:51.900566 kubelet[1435]: E0209 09:13:51.900426 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.000962 kubelet[1435]: E0209 09:13:52.000895 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.102419 kubelet[1435]: E0209 09:13:52.101997 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.203070 kubelet[1435]: E0209 09:13:52.203004 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.304252 kubelet[1435]: E0209 09:13:52.304191 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.405600 kubelet[1435]: E0209 09:13:52.405178 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.506187 kubelet[1435]: E0209 09:13:52.506076 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.605224 kubelet[1435]: E0209 09:13:52.605127 1435 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:52.606380 kubelet[1435]: E0209 09:13:52.606331 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.620296 kubelet[1435]: E0209 09:13:52.620202 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:52.700213 kubelet[1435]: E0209 09:13:52.699803 1435 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"24.144.85.89\" not found" Feb 9 09:13:52.706764 kubelet[1435]: E0209 09:13:52.706702 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.807084 kubelet[1435]: E0209 09:13:52.807003 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:52.907321 kubelet[1435]: E0209 09:13:52.907255 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:53.008442 kubelet[1435]: E0209 09:13:53.007994 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:53.108610 kubelet[1435]: E0209 09:13:53.108485 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:53.209801 kubelet[1435]: E0209 09:13:53.209704 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:53.310852 kubelet[1435]: E0209 09:13:53.310733 1435 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"24.144.85.89\" not found" Feb 9 09:13:53.412591 kubelet[1435]: I0209 09:13:53.412518 1435 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 09:13:53.413153 env[1105]: time="2024-02-09T09:13:53.413097904Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:13:53.414573 kubelet[1435]: I0209 09:13:53.413936 1435 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 09:13:53.617143 kubelet[1435]: I0209 09:13:53.616950 1435 apiserver.go:52] "Watching apiserver" Feb 9 09:13:53.620864 kubelet[1435]: E0209 09:13:53.620821 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:53.655356 kubelet[1435]: I0209 09:13:53.655285 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:13:53.655635 kubelet[1435]: I0209 09:13:53.655393 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:13:53.655635 kubelet[1435]: I0209 09:13:53.655424 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:13:53.656083 kubelet[1435]: E0209 09:13:53.655939 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:13:53.663602 systemd[1]: Created slice kubepods-besteffort-pod0dc51b12_2214_4479_a221_f1d8318bbe87.slice. Feb 9 09:13:53.672955 systemd[1]: Created slice kubepods-besteffort-podffc95e85_a75f_4007_99d5_0745838095f1.slice. Feb 9 09:13:53.720279 kubelet[1435]: I0209 09:13:53.720235 1435 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:13:53.758608 kubelet[1435]: I0209 09:13:53.758554 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-var-lib-calico\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759032 kubelet[1435]: I0209 09:13:53.758999 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkqq6\" (UniqueName: \"kubernetes.io/projected/0dc51b12-2214-4479-a221-f1d8318bbe87-kube-api-access-rkqq6\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759207 kubelet[1435]: I0209 09:13:53.759184 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lks46\" (UniqueName: \"kubernetes.io/projected/ffc95e85-a75f-4007-99d5-0745838095f1-kube-api-access-lks46\") pod \"kube-proxy-vrlq7\" (UID: \"ffc95e85-a75f-4007-99d5-0745838095f1\") " pod="kube-system/kube-proxy-vrlq7" Feb 9 09:13:53.759380 kubelet[1435]: I0209 09:13:53.759356 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-lib-modules\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759499 kubelet[1435]: I0209 09:13:53.759487 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-xtables-lock\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759650 kubelet[1435]: I0209 09:13:53.759639 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0dc51b12-2214-4479-a221-f1d8318bbe87-tigera-ca-bundle\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759765 kubelet[1435]: I0209 09:13:53.759754 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-cni-log-dir\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.759867 kubelet[1435]: I0209 09:13:53.759856 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d58be710-d7c7-4efd-a385-d6a5cc2049b4-varrun\") pod \"csi-node-driver-f2dkv\" (UID: \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\") " pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:13:53.759989 kubelet[1435]: I0209 09:13:53.759975 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d58be710-d7c7-4efd-a385-d6a5cc2049b4-socket-dir\") pod \"csi-node-driver-f2dkv\" (UID: \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\") " pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:13:53.760129 kubelet[1435]: I0209 09:13:53.760104 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d58be710-d7c7-4efd-a385-d6a5cc2049b4-registration-dir\") pod \"csi-node-driver-f2dkv\" (UID: \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\") " pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:13:53.760240 kubelet[1435]: I0209 09:13:53.760229 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0dc51b12-2214-4479-a221-f1d8318bbe87-node-certs\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760403 kubelet[1435]: I0209 09:13:53.760376 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-var-run-calico\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760622 kubelet[1435]: I0209 09:13:53.760583 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-cni-bin-dir\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760690 kubelet[1435]: I0209 09:13:53.760640 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-cni-net-dir\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760690 kubelet[1435]: I0209 09:13:53.760681 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-flexvol-driver-host\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760746 kubelet[1435]: I0209 09:13:53.760714 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d58be710-d7c7-4efd-a385-d6a5cc2049b4-kubelet-dir\") pod \"csi-node-driver-f2dkv\" (UID: \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\") " pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:13:53.760782 kubelet[1435]: I0209 09:13:53.760752 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ffc95e85-a75f-4007-99d5-0745838095f1-kube-proxy\") pod \"kube-proxy-vrlq7\" (UID: \"ffc95e85-a75f-4007-99d5-0745838095f1\") " pod="kube-system/kube-proxy-vrlq7" Feb 9 09:13:53.760813 kubelet[1435]: I0209 09:13:53.760786 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ffc95e85-a75f-4007-99d5-0745838095f1-xtables-lock\") pod \"kube-proxy-vrlq7\" (UID: \"ffc95e85-a75f-4007-99d5-0745838095f1\") " pod="kube-system/kube-proxy-vrlq7" Feb 9 09:13:53.760845 kubelet[1435]: I0209 09:13:53.760825 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0dc51b12-2214-4479-a221-f1d8318bbe87-policysync\") pod \"calico-node-62shw\" (UID: \"0dc51b12-2214-4479-a221-f1d8318bbe87\") " pod="calico-system/calico-node-62shw" Feb 9 09:13:53.760874 kubelet[1435]: I0209 09:13:53.760857 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rd6mm\" (UniqueName: \"kubernetes.io/projected/d58be710-d7c7-4efd-a385-d6a5cc2049b4-kube-api-access-rd6mm\") pod \"csi-node-driver-f2dkv\" (UID: \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\") " pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:13:53.760905 kubelet[1435]: I0209 09:13:53.760881 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ffc95e85-a75f-4007-99d5-0745838095f1-lib-modules\") pod \"kube-proxy-vrlq7\" (UID: \"ffc95e85-a75f-4007-99d5-0745838095f1\") " pod="kube-system/kube-proxy-vrlq7" Feb 9 09:13:53.760905 kubelet[1435]: I0209 09:13:53.760903 1435 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:13:53.863806 kubelet[1435]: E0209 09:13:53.863770 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.864020 kubelet[1435]: W0209 09:13:53.863996 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.864107 kubelet[1435]: E0209 09:13:53.864094 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.864391 kubelet[1435]: E0209 09:13:53.864378 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.864472 kubelet[1435]: W0209 09:13:53.864458 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.864557 kubelet[1435]: E0209 09:13:53.864546 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.864775 kubelet[1435]: E0209 09:13:53.864764 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.864863 kubelet[1435]: W0209 09:13:53.864847 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.864941 kubelet[1435]: E0209 09:13:53.864930 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.865204 kubelet[1435]: E0209 09:13:53.865188 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.865286 kubelet[1435]: W0209 09:13:53.865274 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.865361 kubelet[1435]: E0209 09:13:53.865349 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.870417 kubelet[1435]: E0209 09:13:53.869788 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.870681 kubelet[1435]: W0209 09:13:53.870650 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.870850 kubelet[1435]: E0209 09:13:53.870831 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.871248 kubelet[1435]: E0209 09:13:53.871232 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.871336 kubelet[1435]: W0209 09:13:53.871323 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.871427 kubelet[1435]: E0209 09:13:53.871414 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.871774 kubelet[1435]: E0209 09:13:53.871759 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.871947 kubelet[1435]: W0209 09:13:53.871864 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.872117 kubelet[1435]: E0209 09:13:53.872101 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.872510 kubelet[1435]: E0209 09:13:53.872485 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.872871 kubelet[1435]: W0209 09:13:53.872851 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.872982 kubelet[1435]: E0209 09:13:53.872970 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.873297 kubelet[1435]: E0209 09:13:53.873274 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.873297 kubelet[1435]: W0209 09:13:53.873296 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.873411 kubelet[1435]: E0209 09:13:53.873320 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.873603 kubelet[1435]: E0209 09:13:53.873585 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.873603 kubelet[1435]: W0209 09:13:53.873602 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.873803 kubelet[1435]: E0209 09:13:53.873794 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.873835 kubelet[1435]: W0209 09:13:53.873806 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.873909 kubelet[1435]: E0209 09:13:53.873893 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.873973 kubelet[1435]: E0209 09:13:53.873957 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.874015 kubelet[1435]: W0209 09:13:53.873973 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.874069 kubelet[1435]: E0209 09:13:53.874059 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.874130 kubelet[1435]: E0209 09:13:53.874118 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.874130 kubelet[1435]: W0209 09:13:53.874128 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.874319 kubelet[1435]: E0209 09:13:53.874246 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.874319 kubelet[1435]: W0209 09:13:53.874252 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.874380 kubelet[1435]: E0209 09:13:53.874364 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.874380 kubelet[1435]: W0209 09:13:53.874370 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.874499 kubelet[1435]: E0209 09:13:53.874484 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.874600 kubelet[1435]: E0209 09:13:53.874579 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.874654 kubelet[1435]: E0209 09:13:53.874619 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.874654 kubelet[1435]: E0209 09:13:53.874634 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.874741 kubelet[1435]: E0209 09:13:53.874550 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.874819 kubelet[1435]: W0209 09:13:53.874805 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.875140 kubelet[1435]: E0209 09:13:53.875112 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.875437 kubelet[1435]: E0209 09:13:53.875396 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.875589 kubelet[1435]: W0209 09:13:53.875573 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.875737 kubelet[1435]: E0209 09:13:53.875710 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.875920 kubelet[1435]: E0209 09:13:53.875909 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.875990 kubelet[1435]: W0209 09:13:53.875976 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.876124 kubelet[1435]: E0209 09:13:53.876097 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.876404 kubelet[1435]: E0209 09:13:53.876389 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.876489 kubelet[1435]: W0209 09:13:53.876476 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.876662 kubelet[1435]: E0209 09:13:53.876637 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.876912 kubelet[1435]: E0209 09:13:53.876898 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.877003 kubelet[1435]: W0209 09:13:53.876988 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.877092 kubelet[1435]: E0209 09:13:53.877075 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.877404 kubelet[1435]: E0209 09:13:53.877388 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.877630 kubelet[1435]: W0209 09:13:53.877603 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.877734 kubelet[1435]: E0209 09:13:53.877716 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.877964 kubelet[1435]: E0209 09:13:53.877953 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.878033 kubelet[1435]: W0209 09:13:53.878021 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.878113 kubelet[1435]: E0209 09:13:53.878097 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.878334 kubelet[1435]: E0209 09:13:53.878322 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.878416 kubelet[1435]: W0209 09:13:53.878403 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.878579 kubelet[1435]: E0209 09:13:53.878560 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.878845 kubelet[1435]: E0209 09:13:53.878831 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.879012 kubelet[1435]: W0209 09:13:53.878992 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.879133 kubelet[1435]: E0209 09:13:53.879107 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.879342 kubelet[1435]: E0209 09:13:53.879331 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.879423 kubelet[1435]: W0209 09:13:53.879410 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.879623 kubelet[1435]: E0209 09:13:53.879518 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.879845 kubelet[1435]: E0209 09:13:53.879831 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.879934 kubelet[1435]: W0209 09:13:53.879918 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.880031 kubelet[1435]: E0209 09:13:53.880012 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.880258 kubelet[1435]: E0209 09:13:53.880245 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.880352 kubelet[1435]: W0209 09:13:53.880338 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.880455 kubelet[1435]: E0209 09:13:53.880434 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.880698 kubelet[1435]: E0209 09:13:53.880685 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.880771 kubelet[1435]: W0209 09:13:53.880759 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.880959 kubelet[1435]: E0209 09:13:53.880936 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.881141 kubelet[1435]: E0209 09:13:53.881129 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.881219 kubelet[1435]: W0209 09:13:53.881205 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.881313 kubelet[1435]: E0209 09:13:53.881287 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.881663 kubelet[1435]: E0209 09:13:53.881649 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.881753 kubelet[1435]: W0209 09:13:53.881740 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.881859 kubelet[1435]: E0209 09:13:53.881842 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.882108 kubelet[1435]: E0209 09:13:53.882094 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.882191 kubelet[1435]: W0209 09:13:53.882178 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.882275 kubelet[1435]: E0209 09:13:53.882260 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.882493 kubelet[1435]: E0209 09:13:53.882481 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.882597 kubelet[1435]: W0209 09:13:53.882579 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.882717 kubelet[1435]: E0209 09:13:53.882696 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.883027 kubelet[1435]: E0209 09:13:53.883010 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.883112 kubelet[1435]: W0209 09:13:53.883099 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.883224 kubelet[1435]: E0209 09:13:53.883202 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.883463 kubelet[1435]: E0209 09:13:53.883449 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.883573 kubelet[1435]: W0209 09:13:53.883559 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.883653 kubelet[1435]: E0209 09:13:53.883641 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.963266 kubelet[1435]: E0209 09:13:53.963212 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.963266 kubelet[1435]: W0209 09:13:53.963242 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.963266 kubelet[1435]: E0209 09:13:53.963268 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.963632 kubelet[1435]: E0209 09:13:53.963484 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.963632 kubelet[1435]: W0209 09:13:53.963493 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.963632 kubelet[1435]: E0209 09:13:53.963504 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:53.963827 kubelet[1435]: E0209 09:13:53.963773 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:53.963827 kubelet[1435]: W0209 09:13:53.963789 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:53.963827 kubelet[1435]: E0209 09:13:53.963801 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.007960 sshd[1522]: Failed password for root from 218.92.0.107 port 16337 ssh2 Feb 9 09:13:54.065273 kubelet[1435]: E0209 09:13:54.065236 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.065492 kubelet[1435]: W0209 09:13:54.065463 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.065620 kubelet[1435]: E0209 09:13:54.065598 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.066107 kubelet[1435]: E0209 09:13:54.066072 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.066252 kubelet[1435]: W0209 09:13:54.066233 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.066330 kubelet[1435]: E0209 09:13:54.066318 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.067269 kubelet[1435]: E0209 09:13:54.067053 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.067480 kubelet[1435]: W0209 09:13:54.067452 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.067608 kubelet[1435]: E0209 09:13:54.067594 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.168757 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.169658 kubelet[1435]: W0209 09:13:54.168789 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.168821 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.169099 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.169658 kubelet[1435]: W0209 09:13:54.169115 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.169133 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.169300 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.169658 kubelet[1435]: W0209 09:13:54.169307 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.169658 kubelet[1435]: E0209 09:13:54.169317 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.240963 kubelet[1435]: E0209 09:13:54.240915 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.240963 kubelet[1435]: W0209 09:13:54.240944 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.240963 kubelet[1435]: E0209 09:13:54.240969 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.270581 kubelet[1435]: E0209 09:13:54.270498 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.270816 kubelet[1435]: W0209 09:13:54.270786 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.271023 kubelet[1435]: E0209 09:13:54.270993 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.271611 kubelet[1435]: E0209 09:13:54.271585 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.271731 kubelet[1435]: W0209 09:13:54.271712 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.271861 kubelet[1435]: E0209 09:13:54.271841 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.373138 kubelet[1435]: E0209 09:13:54.373088 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.373422 kubelet[1435]: W0209 09:13:54.373391 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.373612 kubelet[1435]: E0209 09:13:54.373574 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.374233 kubelet[1435]: E0209 09:13:54.374207 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.374373 kubelet[1435]: W0209 09:13:54.374354 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.374584 kubelet[1435]: E0209 09:13:54.374564 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.439448 kubelet[1435]: E0209 09:13:54.439334 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.439948 kubelet[1435]: W0209 09:13:54.439908 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.440078 kubelet[1435]: E0209 09:13:54.440063 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.475839 kubelet[1435]: E0209 09:13:54.475789 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.475839 kubelet[1435]: W0209 09:13:54.475816 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.475839 kubelet[1435]: E0209 09:13:54.475840 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.572360 kubelet[1435]: E0209 09:13:54.572291 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:13:54.573221 env[1105]: time="2024-02-09T09:13:54.573155020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-62shw,Uid:0dc51b12-2214-4479-a221-f1d8318bbe87,Namespace:calico-system,Attempt:0,}" Feb 9 09:13:54.577137 kubelet[1435]: E0209 09:13:54.577085 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.577137 kubelet[1435]: W0209 09:13:54.577117 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.577137 kubelet[1435]: E0209 09:13:54.577146 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.621925 kubelet[1435]: E0209 09:13:54.621855 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:54.637483 kubelet[1435]: E0209 09:13:54.637348 1435 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:13:54.637483 kubelet[1435]: W0209 09:13:54.637377 1435 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:13:54.637483 kubelet[1435]: E0209 09:13:54.637401 1435 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:13:54.881476 kubelet[1435]: E0209 09:13:54.881418 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:13:54.882335 env[1105]: time="2024-02-09T09:13:54.882208691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vrlq7,Uid:ffc95e85-a75f-4007-99d5-0745838095f1,Namespace:kube-system,Attempt:0,}" Feb 9 09:13:54.923000 audit[1522]: ANOM_LOGIN_FAILURES pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:54.924842 sshd[1522]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 09:13:54.923000 audit[1522]: USER_AUTH pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:54.932164 kernel: audit: type=2100 audit(1707470034.923:597): pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:54.932332 kernel: audit: type=1100 audit(1707470034.923:598): pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:55.284718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1238453566.mount: Deactivated successfully. Feb 9 09:13:55.297433 env[1105]: time="2024-02-09T09:13:55.297359622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.303171 env[1105]: time="2024-02-09T09:13:55.303091792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.308578 env[1105]: time="2024-02-09T09:13:55.308479816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.310483 env[1105]: time="2024-02-09T09:13:55.310417786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.313615 env[1105]: time="2024-02-09T09:13:55.313510279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.315797 env[1105]: time="2024-02-09T09:13:55.315732816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.316909 env[1105]: time="2024-02-09T09:13:55.316863829Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.319306 env[1105]: time="2024-02-09T09:13:55.319245166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:55.361445 env[1105]: time="2024-02-09T09:13:55.361108691Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:13:55.361445 env[1105]: time="2024-02-09T09:13:55.361166820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:13:55.361445 env[1105]: time="2024-02-09T09:13:55.361187324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:13:55.362692 env[1105]: time="2024-02-09T09:13:55.361900020Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f8e9d1be7eb3b9aa6cbd6d6e640a1caed03313424984eb601cabca5f87a394b pid=1593 runtime=io.containerd.runc.v2 Feb 9 09:13:55.371318 env[1105]: time="2024-02-09T09:13:55.371232328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:13:55.371318 env[1105]: time="2024-02-09T09:13:55.371279410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:13:55.371731 env[1105]: time="2024-02-09T09:13:55.371292131Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:13:55.371731 env[1105]: time="2024-02-09T09:13:55.371570128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c pid=1596 runtime=io.containerd.runc.v2 Feb 9 09:13:55.397905 systemd[1]: Started cri-containerd-3f8e9d1be7eb3b9aa6cbd6d6e640a1caed03313424984eb601cabca5f87a394b.scope. Feb 9 09:13:55.410689 systemd[1]: Started cri-containerd-163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c.scope. Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.435603 kernel: audit: type=1400 audit(1707470035.427:599): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.435732 kernel: audit: type=1400 audit(1707470035.427:600): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.440573 kernel: audit: type=1400 audit(1707470035.427:601): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.448906 kernel: audit: type=1400 audit(1707470035.427:602): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.448996 kernel: audit: type=1400 audit(1707470035.427:603): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.431000 audit: BPF prog-id=64 op=LOAD Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336562333830346161313865373635643131343333363531353761 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336562333830346161313865373635643131343333363531353761 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit: BPF prog-id=65 op=LOAD Feb 9 09:13:55.434000 audit[1614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002eb900 items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336562333830346161313865373635643131343333363531353761 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.455090 kernel: audit: type=1400 audit(1707470035.427:604): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit: BPF prog-id=66 op=LOAD Feb 9 09:13:55.434000 audit[1614]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eb948 items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336562333830346161313865373635643131343333363531353761 Feb 9 09:13:55.434000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:13:55.434000 audit: BPF prog-id=65 op=UNLOAD Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { perfmon } for pid=1614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit[1614]: AVC avc: denied { bpf } for pid=1614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.434000 audit: BPF prog-id=67 op=LOAD Feb 9 09:13:55.434000 audit[1614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ebd58 items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136336562333830346161313865373635643131343333363531353761 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.467000 audit: BPF prog-id=68 op=LOAD Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1593 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386539643162653765623362396161366362643664366536343061 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1593 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386539643162653765623362396161366362643664366536343061 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit: BPF prog-id=69 op=LOAD Feb 9 09:13:55.468000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015de00 items=0 ppid=1593 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386539643162653765623362396161366362643664366536343061 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.468000 audit: BPF prog-id=70 op=LOAD Feb 9 09:13:55.468000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015de48 items=0 ppid=1593 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386539643162653765623362396161366362643664366536343061 Feb 9 09:13:55.469000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:13:55.469000 audit: BPF prog-id=69 op=UNLOAD Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:55.469000 audit: BPF prog-id=71 op=LOAD Feb 9 09:13:55.469000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000316258 items=0 ppid=1593 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:55.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386539643162653765623362396161366362643664366536343061 Feb 9 09:13:55.487214 env[1105]: time="2024-02-09T09:13:55.487147423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-62shw,Uid:0dc51b12-2214-4479-a221-f1d8318bbe87,Namespace:calico-system,Attempt:0,} returns sandbox id \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\"" Feb 9 09:13:55.489933 kubelet[1435]: E0209 09:13:55.489238 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:13:55.491579 env[1105]: time="2024-02-09T09:13:55.491526825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:13:55.515130 env[1105]: time="2024-02-09T09:13:55.515062074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vrlq7,Uid:ffc95e85-a75f-4007-99d5-0745838095f1,Namespace:kube-system,Attempt:0,} returns sandbox id \"3f8e9d1be7eb3b9aa6cbd6d6e640a1caed03313424984eb601cabca5f87a394b\"" Feb 9 09:13:55.517045 kubelet[1435]: E0209 09:13:55.516778 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:13:55.622219 kubelet[1435]: E0209 09:13:55.622156 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:55.886673 kubelet[1435]: E0209 09:13:55.886476 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:13:56.481461 sshd[1522]: Failed password for root from 218.92.0.107 port 16337 ssh2 Feb 9 09:13:56.623947 kubelet[1435]: E0209 09:13:56.623800 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:57.190642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1897014037.mount: Deactivated successfully. Feb 9 09:13:57.624964 kubelet[1435]: E0209 09:13:57.624902 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:57.887184 kubelet[1435]: E0209 09:13:57.886467 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:13:57.987365 kernel: kauditd_printk_skb: 108 callbacks suppressed Feb 9 09:13:57.987501 kernel: audit: type=1100 audit(1707470037.984:635): pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:57.984000 audit[1522]: USER_AUTH pid=1522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:13:58.080195 env[1105]: time="2024-02-09T09:13:58.080128974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:58.082746 env[1105]: time="2024-02-09T09:13:58.082696775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:58.085137 env[1105]: time="2024-02-09T09:13:58.085086640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:58.088690 env[1105]: time="2024-02-09T09:13:58.088624953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:13:58.089897 env[1105]: time="2024-02-09T09:13:58.089848757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 09:13:58.091840 env[1105]: time="2024-02-09T09:13:58.091803580Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 09:13:58.093648 env[1105]: time="2024-02-09T09:13:58.093599743Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:13:58.108685 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount48298567.mount: Deactivated successfully. Feb 9 09:13:58.117302 env[1105]: time="2024-02-09T09:13:58.117212550Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108\"" Feb 9 09:13:58.119021 env[1105]: time="2024-02-09T09:13:58.118973281Z" level=info msg="StartContainer for \"521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108\"" Feb 9 09:13:58.163660 systemd[1]: Started cri-containerd-521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108.scope. Feb 9 09:13:58.203099 kernel: audit: type=1400 audit(1707470038.192:636): avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.203318 kernel: audit: type=1300 audit(1707470038.192:636): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1596 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1596 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:58.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313239336362613731353336636339393733353837323334383836 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.212780 kernel: audit: type=1327 audit(1707470038.192:636): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313239336362613731353336636339393733353837323334383836 Feb 9 09:13:58.212914 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.217679 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.225466 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.225607 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.225630 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.233488 kernel: audit: type=1400 audit(1707470038.192:637): avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.192000 audit: BPF prog-id=72 op=LOAD Feb 9 09:13:58.192000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031b4f0 items=0 ppid=1596 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:58.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313239336362613731353336636339393733353837323334383836 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit: BPF prog-id=73 op=LOAD Feb 9 09:13:58.202000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031b538 items=0 ppid=1596 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:58.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313239336362613731353336636339393733353837323334383836 Feb 9 09:13:58.202000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:13:58.202000 audit: BPF prog-id=72 op=UNLOAD Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { perfmon } for pid=1668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit[1668]: AVC avc: denied { bpf } for pid=1668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:13:58.202000 audit: BPF prog-id=74 op=LOAD Feb 9 09:13:58.202000 audit[1668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031b5c8 items=0 ppid=1596 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:13:58.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313239336362613731353336636339393733353837323334383836 Feb 9 09:13:58.249380 env[1105]: time="2024-02-09T09:13:58.249253698Z" level=info msg="StartContainer for \"521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108\" returns successfully" Feb 9 09:13:58.260763 systemd[1]: cri-containerd-521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108.scope: Deactivated successfully. Feb 9 09:13:58.262000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:13:58.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-24.144.85.89:22-1.116.235.118:36438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:13:58.271893 systemd[1]: Started sshd@10-24.144.85.89:22-1.116.235.118:36438.service. Feb 9 09:13:58.367124 env[1105]: time="2024-02-09T09:13:58.367007551Z" level=info msg="shim disconnected" id=521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108 Feb 9 09:13:58.367124 env[1105]: time="2024-02-09T09:13:58.367122826Z" level=warning msg="cleaning up after shim disconnected" id=521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108 namespace=k8s.io Feb 9 09:13:58.367124 env[1105]: time="2024-02-09T09:13:58.367134079Z" level=info msg="cleaning up dead shim" Feb 9 09:13:58.380666 env[1105]: time="2024-02-09T09:13:58.380595852Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:13:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1710 runtime=io.containerd.runc.v2\n" Feb 9 09:13:58.625984 kubelet[1435]: E0209 09:13:58.625915 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:58.943623 kubelet[1435]: E0209 09:13:58.942668 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:13:59.060182 sshd[1695]: Invalid user wuchl from 1.116.235.118 port 36438 Feb 9 09:13:59.063214 sshd[1695]: pam_faillock(sshd:auth): User unknown Feb 9 09:13:59.063868 sshd[1695]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:13:59.063916 sshd[1695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.116.235.118 Feb 9 09:13:59.064739 sshd[1695]: pam_faillock(sshd:auth): User unknown Feb 9 09:13:59.063000 audit[1695]: USER_AUTH pid=1695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wuchl" exe="/usr/sbin/sshd" hostname=1.116.235.118 addr=1.116.235.118 terminal=ssh res=failed' Feb 9 09:13:59.105899 systemd[1]: run-containerd-runc-k8s.io-521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108-runc.nBYU0R.mount: Deactivated successfully. Feb 9 09:13:59.106047 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-521293cba71536cc99735872348868fdbe50e6813bc2fc7fb603465a1996d108-rootfs.mount: Deactivated successfully. Feb 9 09:13:59.386116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1167544950.mount: Deactivated successfully. Feb 9 09:13:59.627114 kubelet[1435]: E0209 09:13:59.627049 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:13:59.886477 kubelet[1435]: E0209 09:13:59.886414 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:00.151243 env[1105]: time="2024-02-09T09:14:00.151096466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:00.154802 env[1105]: time="2024-02-09T09:14:00.154745036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:00.157211 env[1105]: time="2024-02-09T09:14:00.157134022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:00.159463 env[1105]: time="2024-02-09T09:14:00.159412097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:00.160015 env[1105]: time="2024-02-09T09:14:00.159961809Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 09:14:00.161353 env[1105]: time="2024-02-09T09:14:00.161313124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:14:00.162789 env[1105]: time="2024-02-09T09:14:00.162742813Z" level=info msg="CreateContainer within sandbox \"3f8e9d1be7eb3b9aa6cbd6d6e640a1caed03313424984eb601cabca5f87a394b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:14:00.181805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1668444292.mount: Deactivated successfully. Feb 9 09:14:00.189221 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1406941905.mount: Deactivated successfully. Feb 9 09:14:00.197384 env[1105]: time="2024-02-09T09:14:00.197305041Z" level=info msg="CreateContainer within sandbox \"3f8e9d1be7eb3b9aa6cbd6d6e640a1caed03313424984eb601cabca5f87a394b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7b8a400180163e9f22ae30b7e9798f41e007f6d53061f32880a950403a585d65\"" Feb 9 09:14:00.198476 env[1105]: time="2024-02-09T09:14:00.198433930Z" level=info msg="StartContainer for \"7b8a400180163e9f22ae30b7e9798f41e007f6d53061f32880a950403a585d65\"" Feb 9 09:14:00.233635 systemd[1]: Started cri-containerd-7b8a400180163e9f22ae30b7e9798f41e007f6d53061f32880a950403a585d65.scope. Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1593 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386134303031383031363365396632326165333062376539373938 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit: BPF prog-id=75 op=LOAD Feb 9 09:14:00.269000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000115600 items=0 ppid=1593 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386134303031383031363365396632326165333062376539373938 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit: BPF prog-id=76 op=LOAD Feb 9 09:14:00.269000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000115648 items=0 ppid=1593 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386134303031383031363365396632326165333062376539373938 Feb 9 09:14:00.269000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:14:00.269000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:00.269000 audit: BPF prog-id=77 op=LOAD Feb 9 09:14:00.269000 audit[1737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0001156d8 items=0 ppid=1593 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386134303031383031363365396632326165333062376539373938 Feb 9 09:14:00.293880 env[1105]: time="2024-02-09T09:14:00.293786133Z" level=info msg="StartContainer for \"7b8a400180163e9f22ae30b7e9798f41e007f6d53061f32880a950403a585d65\" returns successfully" Feb 9 09:14:00.363000 audit[1785]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.363000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed4404930 a2=0 a3=7ffed440491c items=0 ppid=1747 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:14:00.370000 audit[1786]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.370000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6c45e5e0 a2=0 a3=7ffe6c45e5cc items=0 ppid=1747 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:14:00.372000 audit[1788]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.372000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe62347470 a2=0 a3=7ffe6234745c items=0 ppid=1747 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:14:00.372000 audit[1787]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.372000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe66351170 a2=0 a3=31030 items=0 ppid=1747 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:14:00.375000 audit[1789]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.375000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff31892470 a2=0 a3=7fff3189245c items=0 ppid=1747 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:14:00.378000 audit[1790]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.378000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1c28de10 a2=0 a3=7ffc1c28ddfc items=0 ppid=1747 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:14:00.468000 audit[1791]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.468000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe95b95bd0 a2=0 a3=7ffe95b95bbc items=0 ppid=1747 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:14:00.476000 audit[1793]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.476000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea8c21960 a2=0 a3=7ffea8c2194c items=0 ppid=1747 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:14:00.483000 audit[1796]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.483000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec6e676a0 a2=0 a3=7ffec6e6768c items=0 ppid=1747 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:14:00.485000 audit[1797]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.485000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec86765f0 a2=0 a3=7ffec86765dc items=0 ppid=1747 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:14:00.490000 audit[1799]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.490000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7220ca70 a2=0 a3=7ffe7220ca5c items=0 ppid=1747 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:14:00.492000 audit[1800]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.492000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2f13ea50 a2=0 a3=7ffe2f13ea3c items=0 ppid=1747 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:14:00.497000 audit[1802]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.497000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff591d0670 a2=0 a3=7fff591d065c items=0 ppid=1747 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:14:00.504000 audit[1805]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.504000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3f8f01d0 a2=0 a3=7fff3f8f01bc items=0 ppid=1747 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.504000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:14:00.507000 audit[1806]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.507000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd3b7fa70 a2=0 a3=7ffcd3b7fa5c items=0 ppid=1747 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:14:00.512000 audit[1808]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.512000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff47267c0 a2=0 a3=7ffff47267ac items=0 ppid=1747 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:14:00.515000 audit[1809]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.515000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2fa30e50 a2=0 a3=7ffe2fa30e3c items=0 ppid=1747 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:14:00.521000 audit[1811]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.521000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd6c33db0 a2=0 a3=7fffd6c33d9c items=0 ppid=1747 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:14:00.531000 audit[1814]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.531000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe426bc370 a2=0 a3=7ffe426bc35c items=0 ppid=1747 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:14:00.539000 audit[1817]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.539000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3a195540 a2=0 a3=7fff3a19552c items=0 ppid=1747 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:14:00.542000 audit[1818]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.542000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff618c17b0 a2=0 a3=7fff618c179c items=0 ppid=1747 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:14:00.546000 audit[1820]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.546000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff31cc99c0 a2=0 a3=7fff31cc99ac items=0 ppid=1747 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:14:00.553000 audit[1823]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:14:00.553000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5590b040 a2=0 a3=7ffe5590b02c items=0 ppid=1747 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:14:00.563000 audit[1827]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:00.563000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdbfa8ced0 a2=0 a3=7ffdbfa8cebc items=0 ppid=1747 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:00.584000 audit[1827]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:00.584000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdbfa8ced0 a2=0 a3=7ffdbfa8cebc items=0 ppid=1747 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:00.607000 audit[1834]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.607000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd60863b80 a2=0 a3=7ffd60863b6c items=0 ppid=1747 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:14:00.614000 audit[1836]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.614000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe658b74c0 a2=0 a3=7ffe658b74ac items=0 ppid=1747 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:14:00.622826 sshd[1522]: Failed password for root from 218.92.0.107 port 16337 ssh2 Feb 9 09:14:00.625000 audit[1839]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.625000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffc8a75700 a2=0 a3=7fffc8a756ec items=0 ppid=1747 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:14:00.627582 kubelet[1435]: E0209 09:14:00.627473 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:00.629000 audit[1840]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.629000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe821e0f0 a2=0 a3=7fffe821e0dc items=0 ppid=1747 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:14:00.634000 audit[1842]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.634000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4b2221f0 a2=0 a3=7ffd4b2221dc items=0 ppid=1747 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:14:00.637000 audit[1843]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.637000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3ee45c30 a2=0 a3=7ffe3ee45c1c items=0 ppid=1747 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:14:00.642000 audit[1845]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.642000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3c3e8e20 a2=0 a3=7ffe3c3e8e0c items=0 ppid=1747 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:14:00.649000 audit[1848]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.649000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe23d67d10 a2=0 a3=7ffe23d67cfc items=0 ppid=1747 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:14:00.651000 audit[1849]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.651000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcac87e20 a2=0 a3=7ffdcac87e0c items=0 ppid=1747 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:14:00.657000 audit[1851]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.657000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc02d5a070 a2=0 a3=7ffc02d5a05c items=0 ppid=1747 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:14:00.659000 audit[1852]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.659000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd7806cc0 a2=0 a3=7fffd7806cac items=0 ppid=1747 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:14:00.665000 audit[1854]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.665000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0c683f80 a2=0 a3=7ffc0c683f6c items=0 ppid=1747 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:14:00.672000 audit[1857]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.672000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdbbbc2830 a2=0 a3=7ffdbbbc281c items=0 ppid=1747 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:14:00.680000 audit[1860]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.680000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff07031c20 a2=0 a3=7fff07031c0c items=0 ppid=1747 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:14:00.683000 audit[1861]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.683000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff377bf5c0 a2=0 a3=7fff377bf5ac items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:14:00.688000 audit[1863]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.688000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc00c1f720 a2=0 a3=7ffc00c1f70c items=0 ppid=1747 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:14:00.695000 audit[1866]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:14:00.695000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda0fc2e90 a2=0 a3=7ffda0fc2e7c items=0 ppid=1747 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:14:00.707000 audit[1870]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:14:00.707000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff89d24170 a2=0 a3=7fff89d2415c items=0 ppid=1747 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.707000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:00.709000 audit[1870]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:14:00.709000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff89d24170 a2=0 a3=7fff89d2415c items=0 ppid=1747 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:00.709000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:00.948684 kubelet[1435]: E0209 09:14:00.948635 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:01.054115 sshd[1522]: Received disconnect from 218.92.0.107 port 16337:11: [preauth] Feb 9 09:14:01.054115 sshd[1522]: Disconnected from authenticating user root 218.92.0.107 port 16337 [preauth] Feb 9 09:14:01.053119 sshd[1522]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:14:01.055260 systemd[1]: sshd@9-24.144.85.89:22-218.92.0.107:16337.service: Deactivated successfully. Feb 9 09:14:01.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-24.144.85.89:22-218.92.0.107:16337 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:01.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-24.144.85.89:22-218.92.0.107:28626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:01.196944 systemd[1]: Started sshd@11-24.144.85.89:22-218.92.0.107:28626.service. Feb 9 09:14:01.306616 sshd[1695]: Failed password for invalid user wuchl from 1.116.235.118 port 36438 ssh2 Feb 9 09:14:01.628188 kubelet[1435]: E0209 09:14:01.627908 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:01.725059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount454814984.mount: Deactivated successfully. Feb 9 09:14:01.887507 kubelet[1435]: E0209 09:14:01.886925 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:01.951429 kubelet[1435]: E0209 09:14:01.951366 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:02.213000 audit[1873]: USER_AUTH pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:14:02.214346 sshd[1873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:14:02.628425 kubelet[1435]: E0209 09:14:02.628329 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:02.827730 sshd[1695]: Received disconnect from 1.116.235.118 port 36438:11: Bye Bye [preauth] Feb 9 09:14:02.827730 sshd[1695]: Disconnected from invalid user wuchl 1.116.235.118 port 36438 [preauth] Feb 9 09:14:02.828788 systemd[1]: sshd@10-24.144.85.89:22-1.116.235.118:36438.service: Deactivated successfully. Feb 9 09:14:02.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-24.144.85.89:22-1.116.235.118:36438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:03.628788 kubelet[1435]: E0209 09:14:03.628703 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:03.887157 kubelet[1435]: E0209 09:14:03.886940 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:04.202868 sshd[1873]: Failed password for root from 218.92.0.107 port 28626 ssh2 Feb 9 09:14:04.629153 kubelet[1435]: E0209 09:14:04.629093 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:05.267000 audit[1873]: USER_AUTH pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:14:05.269442 kernel: kauditd_printk_skb: 216 callbacks suppressed Feb 9 09:14:05.269573 kernel: audit: type=1100 audit(1707470045.267:699): pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:14:05.629810 kubelet[1435]: E0209 09:14:05.629712 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:05.886396 kubelet[1435]: E0209 09:14:05.886246 1435 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:06.205011 env[1105]: time="2024-02-09T09:14:06.204862414Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:06.206830 env[1105]: time="2024-02-09T09:14:06.206790656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:06.209061 env[1105]: time="2024-02-09T09:14:06.209014513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:06.211183 env[1105]: time="2024-02-09T09:14:06.211149003Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:06.212331 env[1105]: time="2024-02-09T09:14:06.212268698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 09:14:06.214800 env[1105]: time="2024-02-09T09:14:06.214731147Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:14:06.228104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2783430753.mount: Deactivated successfully. Feb 9 09:14:06.241821 env[1105]: time="2024-02-09T09:14:06.241735271Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605\"" Feb 9 09:14:06.244635 env[1105]: time="2024-02-09T09:14:06.244594070Z" level=info msg="StartContainer for \"f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605\"" Feb 9 09:14:06.280653 systemd[1]: Started cri-containerd-f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605.scope. Feb 9 09:14:06.311000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.311000 audit[1884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1596 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:06.320082 kernel: audit: type=1400 audit(1707470046.311:700): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.320267 kernel: audit: type=1300 audit(1707470046.311:700): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1596 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:06.320315 kernel: audit: type=1327 audit(1707470046.311:700): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634346134623166633533613262336330326430656362376261396166 Feb 9 09:14:06.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634346134623166633533613262336330326430656362376261396166 Feb 9 09:14:06.324570 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.327803 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.330849 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.333937 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.344304 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.344445 kernel: audit: type=1400 audit(1707470046.313:701): avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.313000 audit: BPF prog-id=78 op=LOAD Feb 9 09:14:06.313000 audit[1884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a0b20 items=0 ppid=1596 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:06.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634346134623166633533613262336330326430656362376261396166 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.314000 audit: BPF prog-id=79 op=LOAD Feb 9 09:14:06.314000 audit[1884]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a0b68 items=0 ppid=1596 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:06.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634346134623166633533613262336330326430656362376261396166 Feb 9 09:14:06.324000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:14:06.324000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { perfmon } for pid=1884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit[1884]: AVC avc: denied { bpf } for pid=1884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:06.324000 audit: BPF prog-id=80 op=LOAD Feb 9 09:14:06.324000 audit[1884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a0bf8 items=0 ppid=1596 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:06.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634346134623166633533613262336330326430656362376261396166 Feb 9 09:14:06.368810 env[1105]: time="2024-02-09T09:14:06.368752166Z" level=info msg="StartContainer for \"f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605\" returns successfully" Feb 9 09:14:06.630432 kubelet[1435]: E0209 09:14:06.630348 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:06.668791 sshd[1873]: Failed password for root from 218.92.0.107 port 28626 ssh2 Feb 9 09:14:06.872000 audit[1873]: USER_AUTH pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 09:14:06.962097 kubelet[1435]: E0209 09:14:06.961927 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:06.991230 kubelet[1435]: I0209 09:14:06.991047 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vrlq7" podStartSLOduration=-9.223372014863823e+09 pod.CreationTimestamp="2024-02-09 09:13:45 +0000 UTC" firstStartedPulling="2024-02-09 09:13:55.518358163 +0000 UTC m=+23.910991143" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:00.976788343 +0000 UTC m=+29.369421343" watchObservedRunningTime="2024-02-09 09:14:06.990953632 +0000 UTC m=+35.383586624" Feb 9 09:14:07.154488 env[1105]: time="2024-02-09T09:14:07.154392041Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:14:07.158045 systemd[1]: cri-containerd-f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605.scope: Deactivated successfully. Feb 9 09:14:07.161000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:14:07.175831 kubelet[1435]: I0209 09:14:07.174454 1435 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:14:07.190213 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605-rootfs.mount: Deactivated successfully. Feb 9 09:14:07.358079 env[1105]: time="2024-02-09T09:14:07.358010375Z" level=info msg="shim disconnected" id=f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605 Feb 9 09:14:07.358079 env[1105]: time="2024-02-09T09:14:07.358076414Z" level=warning msg="cleaning up after shim disconnected" id=f44a4b1fc53a2b3c02d0ecb7ba9af7f5ca91084876a43394079e3a3d4b2c0605 namespace=k8s.io Feb 9 09:14:07.358694 env[1105]: time="2024-02-09T09:14:07.358093688Z" level=info msg="cleaning up dead shim" Feb 9 09:14:07.370425 env[1105]: time="2024-02-09T09:14:07.370363018Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:14:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" Feb 9 09:14:07.631336 kubelet[1435]: E0209 09:14:07.631111 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:07.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.144.85.89:22-81.68.86.156:36028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:07.712374 systemd[1]: Started sshd@12-24.144.85.89:22-81.68.86.156:36028.service. Feb 9 09:14:07.892763 systemd[1]: Created slice kubepods-besteffort-podd58be710_d7c7_4efd_a385_d6a5cc2049b4.slice. Feb 9 09:14:07.897759 env[1105]: time="2024-02-09T09:14:07.897695114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f2dkv,Uid:d58be710-d7c7-4efd-a385-d6a5cc2049b4,Namespace:calico-system,Attempt:0,}" Feb 9 09:14:07.965587 kubelet[1435]: E0209 09:14:07.965527 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:07.967365 env[1105]: time="2024-02-09T09:14:07.967310570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:14:07.992876 env[1105]: time="2024-02-09T09:14:07.992789609Z" level=error msg="Failed to destroy network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:07.994867 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881-shm.mount: Deactivated successfully. Feb 9 09:14:07.996308 env[1105]: time="2024-02-09T09:14:07.996244665Z" level=error msg="encountered an error cleaning up failed sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:07.996621 env[1105]: time="2024-02-09T09:14:07.996489844Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f2dkv,Uid:d58be710-d7c7-4efd-a385-d6a5cc2049b4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:07.997145 kubelet[1435]: E0209 09:14:07.997092 1435 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:07.997286 kubelet[1435]: E0209 09:14:07.997259 1435 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:14:07.997352 kubelet[1435]: E0209 09:14:07.997302 1435 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f2dkv" Feb 9 09:14:07.997433 kubelet[1435]: E0209 09:14:07.997396 1435 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f2dkv_calico-system(d58be710-d7c7-4efd-a385-d6a5cc2049b4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f2dkv_calico-system(d58be710-d7c7-4efd-a385-d6a5cc2049b4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:08.632071 kubelet[1435]: E0209 09:14:08.632015 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:08.746028 sshd[1873]: Failed password for root from 218.92.0.107 port 28626 ssh2 Feb 9 09:14:08.968659 kubelet[1435]: I0209 09:14:08.968093 1435 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:08.969877 env[1105]: time="2024-02-09T09:14:08.969833094Z" level=info msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" Feb 9 09:14:09.006562 env[1105]: time="2024-02-09T09:14:09.006473599Z" level=error msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" failed" error="failed to destroy network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:09.007231 kubelet[1435]: E0209 09:14:09.007188 1435 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:09.007455 kubelet[1435]: E0209 09:14:09.007268 1435 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881} Feb 9 09:14:09.007565 kubelet[1435]: E0209 09:14:09.007498 1435 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:14:09.007565 kubelet[1435]: E0209 09:14:09.007564 1435 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d58be710-d7c7-4efd-a385-d6a5cc2049b4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f2dkv" podUID=d58be710-d7c7-4efd-a385-d6a5cc2049b4 Feb 9 09:14:09.633358 kubelet[1435]: E0209 09:14:09.633303 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:09.927019 sshd[1873]: Received disconnect from 218.92.0.107 port 28626:11: [preauth] Feb 9 09:14:09.927019 sshd[1873]: Disconnected from authenticating user root 218.92.0.107 port 28626 [preauth] Feb 9 09:14:09.927654 sshd[1873]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 09:14:09.928974 systemd[1]: sshd@11-24.144.85.89:22-218.92.0.107:28626.service: Deactivated successfully. Feb 9 09:14:09.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-24.144.85.89:22-218.92.0.107:28626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:10.300356 sshd[1946]: Invalid user fallahi from 81.68.86.156 port 36028 Feb 9 09:14:10.303091 sshd[1946]: pam_faillock(sshd:auth): User unknown Feb 9 09:14:10.304093 sshd[1946]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:14:10.304282 sshd[1946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.86.156 Feb 9 09:14:10.304980 sshd[1946]: pam_faillock(sshd:auth): User unknown Feb 9 09:14:10.303000 audit[1946]: USER_AUTH pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fallahi" exe="/usr/sbin/sshd" hostname=81.68.86.156 addr=81.68.86.156 terminal=ssh res=failed' Feb 9 09:14:10.306413 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 9 09:14:10.306485 kernel: audit: type=1100 audit(1707470050.303:710): pid=1946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fallahi" exe="/usr/sbin/sshd" hostname=81.68.86.156 addr=81.68.86.156 terminal=ssh res=failed' Feb 9 09:14:10.634439 kubelet[1435]: E0209 09:14:10.634276 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:11.269789 kubelet[1435]: I0209 09:14:11.268761 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:14:11.276914 systemd[1]: Created slice kubepods-besteffort-podd5b4cd86_7f00_438b_b728_8a8192745d03.slice. Feb 9 09:14:11.292556 kubelet[1435]: W0209 09:14:11.292346 1435 reflector.go:424] object-"default"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:24.144.85.89" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '24.144.85.89' and this object Feb 9 09:14:11.292556 kubelet[1435]: E0209 09:14:11.292472 1435 reflector.go:140] object-"default"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:24.144.85.89" cannot list resource "configmaps" in API group "" in the namespace "default": no relationship found between node '24.144.85.89' and this object Feb 9 09:14:11.293393 kubelet[1435]: I0209 09:14:11.293330 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d6gsk\" (UniqueName: \"kubernetes.io/projected/d5b4cd86-7f00-438b-b728-8a8192745d03-kube-api-access-d6gsk\") pod \"nginx-deployment-8ffc5cf85-9s5sc\" (UID: \"d5b4cd86-7f00-438b-b728-8a8192745d03\") " pod="default/nginx-deployment-8ffc5cf85-9s5sc" Feb 9 09:14:11.634714 kubelet[1435]: E0209 09:14:11.634656 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:12.010221 update_engine[1099]: I0209 09:14:12.009706 1099 update_attempter.cc:509] Updating boot flags... Feb 9 09:14:12.056726 sshd[1946]: Failed password for invalid user fallahi from 81.68.86.156 port 36028 ssh2 Feb 9 09:14:12.403950 kubelet[1435]: E0209 09:14:12.403882 1435 projected.go:292] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:14:12.403950 kubelet[1435]: E0209 09:14:12.403941 1435 projected.go:198] Error preparing data for projected volume kube-api-access-d6gsk for pod default/nginx-deployment-8ffc5cf85-9s5sc: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:14:12.404294 kubelet[1435]: E0209 09:14:12.404055 1435 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/d5b4cd86-7f00-438b-b728-8a8192745d03-kube-api-access-d6gsk podName:d5b4cd86-7f00-438b-b728-8a8192745d03 nodeName:}" failed. No retries permitted until 2024-02-09 09:14:12.904009435 +0000 UTC m=+41.296642424 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-d6gsk" (UniqueName: "kubernetes.io/projected/d5b4cd86-7f00-438b-b728-8a8192745d03-kube-api-access-d6gsk") pod "nginx-deployment-8ffc5cf85-9s5sc" (UID: "d5b4cd86-7f00-438b-b728-8a8192745d03") : failed to sync configmap cache: timed out waiting for the condition Feb 9 09:14:12.604758 kubelet[1435]: E0209 09:14:12.604691 1435 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:12.636102 kubelet[1435]: E0209 09:14:12.635999 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:13.083292 env[1105]: time="2024-02-09T09:14:13.083174103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9s5sc,Uid:d5b4cd86-7f00-438b-b728-8a8192745d03,Namespace:default,Attempt:0,}" Feb 9 09:14:13.183683 sshd[1946]: Received disconnect from 81.68.86.156 port 36028:11: Bye Bye [preauth] Feb 9 09:14:13.183683 sshd[1946]: Disconnected from invalid user fallahi 81.68.86.156 port 36028 [preauth] Feb 9 09:14:13.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.144.85.89:22-81.68.86.156:36028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:13.185282 systemd[1]: sshd@12-24.144.85.89:22-81.68.86.156:36028.service: Deactivated successfully. Feb 9 09:14:13.193677 kernel: audit: type=1131 audit(1707470053.184:711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-24.144.85.89:22-81.68.86.156:36028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:13.282045 env[1105]: time="2024-02-09T09:14:13.281959306Z" level=error msg="Failed to destroy network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:13.284969 env[1105]: time="2024-02-09T09:14:13.284892419Z" level=error msg="encountered an error cleaning up failed sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:13.285140 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd-shm.mount: Deactivated successfully. Feb 9 09:14:13.285339 env[1105]: time="2024-02-09T09:14:13.285297046Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9s5sc,Uid:d5b4cd86-7f00-438b-b728-8a8192745d03,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:13.286566 kubelet[1435]: E0209 09:14:13.286382 1435 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:13.286566 kubelet[1435]: E0209 09:14:13.286465 1435 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9s5sc" Feb 9 09:14:13.286566 kubelet[1435]: E0209 09:14:13.286496 1435 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9s5sc" Feb 9 09:14:13.286866 kubelet[1435]: E0209 09:14:13.286834 1435 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-9s5sc_default(d5b4cd86-7f00-438b-b728-8a8192745d03)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-9s5sc_default(d5b4cd86-7f00-438b-b728-8a8192745d03)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9s5sc" podUID=d5b4cd86-7f00-438b-b728-8a8192745d03 Feb 9 09:14:13.636465 kubelet[1435]: E0209 09:14:13.636394 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:13.981188 kubelet[1435]: I0209 09:14:13.980083 1435 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:13.981766 env[1105]: time="2024-02-09T09:14:13.981713156Z" level=info msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" Feb 9 09:14:14.045777 env[1105]: time="2024-02-09T09:14:14.045677794Z" level=error msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" failed" error="failed to destroy network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:14:14.046356 kubelet[1435]: E0209 09:14:14.046133 1435 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:14.046356 kubelet[1435]: E0209 09:14:14.046186 1435 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd} Feb 9 09:14:14.046356 kubelet[1435]: E0209 09:14:14.046232 1435 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d5b4cd86-7f00-438b-b728-8a8192745d03\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:14:14.046356 kubelet[1435]: E0209 09:14:14.046276 1435 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d5b4cd86-7f00-438b-b728-8a8192745d03\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9s5sc" podUID=d5b4cd86-7f00-438b-b728-8a8192745d03 Feb 9 09:14:14.637325 kubelet[1435]: E0209 09:14:14.637230 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:15.638189 kubelet[1435]: E0209 09:14:15.638123 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:16.454892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount698220052.mount: Deactivated successfully. Feb 9 09:14:16.535418 env[1105]: time="2024-02-09T09:14:16.535345004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:16.537584 env[1105]: time="2024-02-09T09:14:16.537511606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:16.540330 env[1105]: time="2024-02-09T09:14:16.540274988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:16.541869 env[1105]: time="2024-02-09T09:14:16.541822872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:16.542813 env[1105]: time="2024-02-09T09:14:16.542771033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 09:14:16.564798 env[1105]: time="2024-02-09T09:14:16.564722580Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:14:16.585275 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3303363384.mount: Deactivated successfully. Feb 9 09:14:16.596145 env[1105]: time="2024-02-09T09:14:16.596061189Z" level=info msg="CreateContainer within sandbox \"163eb3804aa18e765d1143365157a17433eaee63308f66303a56af2de5dd2a1c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa\"" Feb 9 09:14:16.597587 env[1105]: time="2024-02-09T09:14:16.597368833Z" level=info msg="StartContainer for \"f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa\"" Feb 9 09:14:16.619937 systemd[1]: Started cri-containerd-f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa.scope. Feb 9 09:14:16.639310 kubelet[1435]: E0209 09:14:16.639206 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.672938 kernel: audit: type=1400 audit(1707470056.653:712): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1596 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:16.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373364396363363263396136383533373739376532386237616233 Feb 9 09:14:16.685891 kernel: audit: type=1300 audit(1707470056.653:712): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1596 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:16.686130 kernel: audit: type=1327 audit(1707470056.653:712): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373364396363363263396136383533373739376532386237616233 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.690819 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.691017 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.705048 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.705268 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.717679 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.717864 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.722432 kernel: audit: type=1400 audit(1707470056.653:713): avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.653000 audit: BPF prog-id=81 op=LOAD Feb 9 09:14:16.653000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000276c20 items=0 ppid=1596 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:16.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373364396363363263396136383533373739376532386237616233 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit: BPF prog-id=82 op=LOAD Feb 9 09:14:16.671000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000276c68 items=0 ppid=1596 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:16.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373364396363363263396136383533373739376532386237616233 Feb 9 09:14:16.671000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:14:16.671000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:16.671000 audit: BPF prog-id=83 op=LOAD Feb 9 09:14:16.671000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000276cf8 items=0 ppid=1596 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:16.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373364396363363263396136383533373739376532386237616233 Feb 9 09:14:16.737108 env[1105]: time="2024-02-09T09:14:16.737042270Z" level=info msg="StartContainer for \"f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa\" returns successfully" Feb 9 09:14:16.847789 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:14:16.847994 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:14:16.990055 kubelet[1435]: E0209 09:14:16.989908 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:17.015286 kubelet[1435]: I0209 09:14:17.015227 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-62shw" podStartSLOduration=-9.223372004839584e+09 pod.CreationTimestamp="2024-02-09 09:13:45 +0000 UTC" firstStartedPulling="2024-02-09 09:13:55.490612204 +0000 UTC m=+23.883245182" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:17.015137706 +0000 UTC m=+45.407770724" watchObservedRunningTime="2024-02-09 09:14:17.015190957 +0000 UTC m=+45.407823953" Feb 9 09:14:17.640381 kubelet[1435]: E0209 09:14:17.640312 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:17.992831 kubelet[1435]: E0209 09:14:17.992256 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:18.016292 systemd[1]: run-containerd-runc-k8s.io-f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa-runc.mnzQmS.mount: Deactivated successfully. Feb 9 09:14:18.349000 audit[2234]: AVC avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=19891 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.349000 audit[2234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8378097a a2=241 a3=1b6 items=1 ppid=2202 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.349000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:14:18.349000 audit: PATH item=0 name="/dev/fd/63" inode=19873 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.355000 audit[2237]: AVC avc: denied { write } for pid=2237 comm="tee" name="fd" dev="proc" ino=19896 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.355000 audit[2237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdccc6297a a2=241 a3=1b6 items=1 ppid=2199 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.355000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:14:18.355000 audit: PATH item=0 name="/dev/fd/63" inode=19876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.367000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=19900 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.367000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc3bb597b a2=241 a3=1b6 items=1 ppid=2201 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.367000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:14:18.367000 audit: PATH item=0 name="/dev/fd/63" inode=19888 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.370000 audit[2253]: AVC avc: denied { write } for pid=2253 comm="tee" name="fd" dev="proc" ino=20843 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.378000 audit[2246]: AVC avc: denied { write } for pid=2246 comm="tee" name="fd" dev="proc" ino=20844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.378000 audit[2246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe917a397a a2=241 a3=1b6 items=1 ppid=2195 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.378000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:14:18.378000 audit: PATH item=0 name="/dev/fd/63" inode=20826 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.381000 audit[2261]: AVC avc: denied { write } for pid=2261 comm="tee" name="fd" dev="proc" ino=20848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.382000 audit[2258]: AVC avc: denied { write } for pid=2258 comm="tee" name="fd" dev="proc" ino=20851 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:14:18.370000 audit[2253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7fcb996b a2=241 a3=1b6 items=1 ppid=2205 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.370000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:14:18.370000 audit: PATH item=0 name="/dev/fd/63" inode=20829 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.382000 audit[2258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4b6c396a a2=241 a3=1b6 items=1 ppid=2203 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.382000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:14:18.382000 audit: PATH item=0 name="/dev/fd/63" inode=19893 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.381000 audit[2261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1477097c a2=241 a3=1b6 items=1 ppid=2206 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.381000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:14:18.381000 audit: PATH item=0 name="/dev/fd/63" inode=20837 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:18.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:14:18.639637 kernel: Initializing XFRM netlink socket Feb 9 09:14:18.641135 kubelet[1435]: E0209 09:14:18.641098 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit: BPF prog-id=84 op=LOAD Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec5130100 a2=70 a3=7fa7c7c07000 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit: BPF prog-id=84 op=UNLOAD Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit: BPF prog-id=85 op=LOAD Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec5130100 a2=70 a3=6e items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec51300b0 a2=70 a3=7ffec5130100 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit: BPF prog-id=86 op=LOAD Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffec5130090 a2=70 a3=7ffec5130100 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec5130170 a2=70 a3=0 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec5130160 a2=70 a3=0 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.823000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.823000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffec51301a0 a2=70 a3=0 items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.824000 audit: BPF prog-id=87 op=LOAD Feb 9 09:14:18.824000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffec51300c0 a2=70 a3=ffffffff items=0 ppid=2209 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.824000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:14:18.832000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.832000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc4cddc660 a2=70 a3=fff80800 items=0 ppid=2209 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:14:18.832000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:18.832000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc4cddc530 a2=70 a3=3 items=0 ppid=2209 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.832000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:14:18.842000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:14:18.926000 audit[2360]: NETFILTER_CFG table=mangle:79 family=2 entries=19 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:18.926000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd8d8de7b0 a2=0 a3=7ffd8d8de79c items=0 ppid=2209 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.926000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:18.930000 audit[2357]: NETFILTER_CFG table=raw:80 family=2 entries=19 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:18.930000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff44896330 a2=0 a3=55adcfa0c000 items=0 ppid=2209 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.930000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:18.936000 audit[2358]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:18.936000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffed3dc2f00 a2=0 a3=55b5c1a59000 items=0 ppid=2209 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.936000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:18.938000 audit[2359]: NETFILTER_CFG table=filter:82 family=2 entries=39 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:18.938000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff41960f80 a2=0 a3=562791038000 items=0 ppid=2209 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:18.938000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:18.994462 kubelet[1435]: E0209 09:14:18.994396 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:19.023353 systemd[1]: run-containerd-runc-k8s.io-f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa-runc.Kr2cJF.mount: Deactivated successfully. Feb 9 09:14:19.641794 kubelet[1435]: E0209 09:14:19.641729 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:19.662320 systemd-networkd[1000]: vxlan.calico: Link UP Feb 9 09:14:19.662330 systemd-networkd[1000]: vxlan.calico: Gained carrier Feb 9 09:14:19.886972 env[1105]: time="2024-02-09T09:14:19.886921127Z" level=info msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.966 [INFO][2406] k8s.go 578: Cleaning up netns ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.967 [INFO][2406] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" iface="eth0" netns="/var/run/netns/cni-f422e9a6-a9a5-380b-c954-b3516081ffcd" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.968 [INFO][2406] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" iface="eth0" netns="/var/run/netns/cni-f422e9a6-a9a5-380b-c954-b3516081ffcd" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.969 [INFO][2406] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" iface="eth0" netns="/var/run/netns/cni-f422e9a6-a9a5-380b-c954-b3516081ffcd" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.969 [INFO][2406] k8s.go 585: Releasing IP address(es) ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:19.969 [INFO][2406] utils.go 188: Calico CNI releasing IP address ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.015 [INFO][2412] ipam_plugin.go 415: Releasing address using handleID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.016 [INFO][2412] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.016 [INFO][2412] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.027 [WARNING][2412] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.027 [INFO][2412] ipam_plugin.go 443: Releasing address using workloadID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.030 [INFO][2412] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:20.033832 env[1105]: 2024-02-09 09:14:20.032 [INFO][2406] k8s.go 591: Teardown processing complete. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:20.037590 systemd[1]: run-netns-cni\x2df422e9a6\x2da9a5\x2d380b\x2dc954\x2db3516081ffcd.mount: Deactivated successfully. Feb 9 09:14:20.038831 env[1105]: time="2024-02-09T09:14:20.038652385Z" level=info msg="TearDown network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" successfully" Feb 9 09:14:20.038831 env[1105]: time="2024-02-09T09:14:20.038709556Z" level=info msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" returns successfully" Feb 9 09:14:20.039968 env[1105]: time="2024-02-09T09:14:20.039910406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f2dkv,Uid:d58be710-d7c7-4efd-a385-d6a5cc2049b4,Namespace:calico-system,Attempt:1,}" Feb 9 09:14:20.258966 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:14:20.259114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali49af0143339: link becomes ready Feb 9 09:14:20.256811 systemd-networkd[1000]: cali49af0143339: Link UP Feb 9 09:14:20.259468 systemd-networkd[1000]: cali49af0143339: Gained carrier Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.117 [INFO][2418] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {24.144.85.89-k8s-csi--node--driver--f2dkv-eth0 csi-node-driver- calico-system d58be710-d7c7-4efd-a385-d6a5cc2049b4 1016 0 2024-02-09 09:13:45 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 24.144.85.89 csi-node-driver-f2dkv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali49af0143339 [] []}} ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.117 [INFO][2418] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.173 [INFO][2432] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" HandleID="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.191 [INFO][2432] ipam_plugin.go 268: Auto assigning IP ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" HandleID="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-system", "node":"24.144.85.89", "pod":"csi-node-driver-f2dkv", "timestamp":"2024-02-09 09:14:20.173079774 +0000 UTC"}, Hostname:"24.144.85.89", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.191 [INFO][2432] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.191 [INFO][2432] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.191 [INFO][2432] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '24.144.85.89' Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.195 [INFO][2432] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.206 [INFO][2432] ipam.go 372: Looking up existing affinities for host host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.217 [INFO][2432] ipam.go 489: Trying affinity for 192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.222 [INFO][2432] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.226 [INFO][2432] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.227 [INFO][2432] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.230 [INFO][2432] ipam.go 1682: Creating new handle: k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390 Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.237 [INFO][2432] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.248 [INFO][2432] ipam.go 1216: Successfully claimed IPs: [192.168.105.129/26] block=192.168.105.128/26 handle="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.248 [INFO][2432] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.129/26] handle="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" host="24.144.85.89" Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.248 [INFO][2432] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:20.276973 env[1105]: 2024-02-09 09:14:20.249 [INFO][2432] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.129/26] IPv6=[] ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" HandleID="k8s-pod-network.f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.253 [INFO][2418] k8s.go 385: Populated endpoint ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-csi--node--driver--f2dkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d58be710-d7c7-4efd-a385-d6a5cc2049b4", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 13, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"", Pod:"csi-node-driver-f2dkv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali49af0143339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.253 [INFO][2418] k8s.go 386: Calico CNI using IPs: [192.168.105.129/32] ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.253 [INFO][2418] dataplane_linux.go 68: Setting the host side veth name to cali49af0143339 ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.259 [INFO][2418] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.260 [INFO][2418] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-csi--node--driver--f2dkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d58be710-d7c7-4efd-a385-d6a5cc2049b4", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 13, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390", Pod:"csi-node-driver-f2dkv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali49af0143339", MAC:"8e:c9:9a:84:bc:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:20.277796 env[1105]: 2024-02-09 09:14:20.274 [INFO][2418] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390" Namespace="calico-system" Pod="csi-node-driver-f2dkv" WorkloadEndpoint="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:20.298346 env[1105]: time="2024-02-09T09:14:20.298173992Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:14:20.298346 env[1105]: time="2024-02-09T09:14:20.298217629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:14:20.298617 env[1105]: time="2024-02-09T09:14:20.298230762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:14:20.299387 env[1105]: time="2024-02-09T09:14:20.299276093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390 pid=2459 runtime=io.containerd.runc.v2 Feb 9 09:14:20.313000 audit[2472]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:20.313000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd61379190 a2=0 a3=7ffd6137917c items=0 ppid=2209 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.313000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:20.326114 systemd[1]: Started cri-containerd-f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390.scope. Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.351000 audit: BPF prog-id=88 op=LOAD Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2459 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637316135646262313665326465353263356230646437336162613531 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2459 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637316135646262313665326465353263356230646437336162613531 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit: BPF prog-id=89 op=LOAD Feb 9 09:14:20.353000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037ce30 items=0 ppid=2459 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637316135646262313665326465353263356230646437336162613531 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit: BPF prog-id=90 op=LOAD Feb 9 09:14:20.353000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037ce78 items=0 ppid=2459 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637316135646262313665326465353263356230646437336162613531 Feb 9 09:14:20.353000 audit: BPF prog-id=90 op=UNLOAD Feb 9 09:14:20.353000 audit: BPF prog-id=89 op=UNLOAD Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:20.353000 audit: BPF prog-id=91 op=LOAD Feb 9 09:14:20.353000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037d288 items=0 ppid=2459 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:20.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637316135646262313665326465353263356230646437336162613531 Feb 9 09:14:20.374105 env[1105]: time="2024-02-09T09:14:20.374002838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f2dkv,Uid:d58be710-d7c7-4efd-a385-d6a5cc2049b4,Namespace:calico-system,Attempt:1,} returns sandbox id \"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390\"" Feb 9 09:14:20.376412 env[1105]: time="2024-02-09T09:14:20.376351952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:14:20.642173 kubelet[1435]: E0209 09:14:20.642075 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:20.950827 systemd-networkd[1000]: vxlan.calico: Gained IPv6LL Feb 9 09:14:21.037674 systemd[1]: run-containerd-runc-k8s.io-f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390-runc.wr2u48.mount: Deactivated successfully. Feb 9 09:14:21.642629 kubelet[1435]: E0209 09:14:21.642571 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:21.655958 systemd-networkd[1000]: cali49af0143339: Gained IPv6LL Feb 9 09:14:21.918772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3943378400.mount: Deactivated successfully. Feb 9 09:14:22.340888 env[1105]: time="2024-02-09T09:14:22.340814708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:22.342712 env[1105]: time="2024-02-09T09:14:22.342667082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:22.344636 env[1105]: time="2024-02-09T09:14:22.344590404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:22.346752 env[1105]: time="2024-02-09T09:14:22.346607613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:22.347943 env[1105]: time="2024-02-09T09:14:22.347891558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 09:14:22.351036 env[1105]: time="2024-02-09T09:14:22.350982889Z" level=info msg="CreateContainer within sandbox \"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:14:22.371379 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3358036135.mount: Deactivated successfully. Feb 9 09:14:22.380858 env[1105]: time="2024-02-09T09:14:22.380779826Z" level=info msg="CreateContainer within sandbox \"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"68576b5fcb0caf4a96b5bed05644886cb7f0bcefef549fd37786118ac6ade00b\"" Feb 9 09:14:22.381984 env[1105]: time="2024-02-09T09:14:22.381941687Z" level=info msg="StartContainer for \"68576b5fcb0caf4a96b5bed05644886cb7f0bcefef549fd37786118ac6ade00b\"" Feb 9 09:14:22.413114 systemd[1]: Started cri-containerd-68576b5fcb0caf4a96b5bed05644886cb7f0bcefef549fd37786118ac6ade00b.scope. Feb 9 09:14:22.417034 systemd[1]: run-containerd-runc-k8s.io-68576b5fcb0caf4a96b5bed05644886cb7f0bcefef549fd37786118ac6ade00b-runc.WohEX0.mount: Deactivated successfully. Feb 9 09:14:22.445609 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 9 09:14:22.445793 kernel: audit: type=1400 audit(1707470062.439:762): avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2459 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:22.451742 kernel: audit: type=1300 audit(1707470062.439:762): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2459 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:22.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353736623566636230636166346139366235626564303536343438 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.461485 kernel: audit: type=1327 audit(1707470062.439:762): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353736623566636230636166346139366235626564303536343438 Feb 9 09:14:22.461646 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.472598 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.472724 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.476229 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.479242 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.483191 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.488580 kernel: audit: type=1400 audit(1707470062.439:763): avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit: BPF prog-id=92 op=LOAD Feb 9 09:14:22.439000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0002cdbd0 items=0 ppid=2459 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:22.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353736623566636230636166346139366235626564303536343438 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit: BPF prog-id=93 op=LOAD Feb 9 09:14:22.439000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0002cdc18 items=0 ppid=2459 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:22.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353736623566636230636166346139366235626564303536343438 Feb 9 09:14:22.439000 audit: BPF prog-id=93 op=UNLOAD Feb 9 09:14:22.439000 audit: BPF prog-id=92 op=UNLOAD Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:22.439000 audit: BPF prog-id=94 op=LOAD Feb 9 09:14:22.439000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0002cdca8 items=0 ppid=2459 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:22.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353736623566636230636166346139366235626564303536343438 Feb 9 09:14:22.491924 env[1105]: time="2024-02-09T09:14:22.491861242Z" level=info msg="StartContainer for \"68576b5fcb0caf4a96b5bed05644886cb7f0bcefef549fd37786118ac6ade00b\" returns successfully" Feb 9 09:14:22.493825 env[1105]: time="2024-02-09T09:14:22.493768692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 09:14:22.643732 kubelet[1435]: E0209 09:14:22.643370 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:23.643951 kubelet[1435]: E0209 09:14:23.643881 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:23.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-24.144.85.89:22-152.136.161.237:53556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:23.655084 systemd[1]: Started sshd@13-24.144.85.89:22-152.136.161.237:53556.service. Feb 9 09:14:24.253955 env[1105]: time="2024-02-09T09:14:24.253879544Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:24.256520 env[1105]: time="2024-02-09T09:14:24.256475509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:24.259336 env[1105]: time="2024-02-09T09:14:24.259271821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:24.262186 env[1105]: time="2024-02-09T09:14:24.262138836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:24.262976 env[1105]: time="2024-02-09T09:14:24.262943913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 09:14:24.265824 env[1105]: time="2024-02-09T09:14:24.265776485Z" level=info msg="CreateContainer within sandbox \"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 09:14:24.283702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount255835198.mount: Deactivated successfully. Feb 9 09:14:24.292283 env[1105]: time="2024-02-09T09:14:24.292205121Z" level=info msg="CreateContainer within sandbox \"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"34082ffbe90d2c0eae3544e90334f8d99c8bf069e570eb30041485a3c741043a\"" Feb 9 09:14:24.293227 env[1105]: time="2024-02-09T09:14:24.293166319Z" level=info msg="StartContainer for \"34082ffbe90d2c0eae3544e90334f8d99c8bf069e570eb30041485a3c741043a\"" Feb 9 09:14:24.327100 systemd[1]: Started cri-containerd-34082ffbe90d2c0eae3544e90334f8d99c8bf069e570eb30041485a3c741043a.scope. Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2459 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:24.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303832666662653930643263306561653335343465393033333466 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit: BPF prog-id=95 op=LOAD Feb 9 09:14:24.351000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000302670 items=0 ppid=2459 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:24.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303832666662653930643263306561653335343465393033333466 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.351000 audit: BPF prog-id=96 op=LOAD Feb 9 09:14:24.351000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003026b8 items=0 ppid=2459 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:24.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303832666662653930643263306561653335343465393033333466 Feb 9 09:14:24.353000 audit: BPF prog-id=96 op=UNLOAD Feb 9 09:14:24.353000 audit: BPF prog-id=95 op=UNLOAD Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:24.353000 audit: BPF prog-id=97 op=LOAD Feb 9 09:14:24.353000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000302748 items=0 ppid=2459 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:24.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303832666662653930643263306561653335343465393033333466 Feb 9 09:14:24.367371 systemd[1]: run-containerd-runc-k8s.io-34082ffbe90d2c0eae3544e90334f8d99c8bf069e570eb30041485a3c741043a-runc.G8ieAh.mount: Deactivated successfully. Feb 9 09:14:24.384363 env[1105]: time="2024-02-09T09:14:24.384279235Z" level=info msg="StartContainer for \"34082ffbe90d2c0eae3544e90334f8d99c8bf069e570eb30041485a3c741043a\" returns successfully" Feb 9 09:14:24.500524 sshd[2532]: Invalid user vahidghaemifard from 152.136.161.237 port 53556 Feb 9 09:14:24.505137 sshd[2532]: pam_faillock(sshd:auth): User unknown Feb 9 09:14:24.508710 sshd[2532]: pam_unix(sshd:auth): check pass; user unknown Feb 9 09:14:24.508925 sshd[2532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.161.237 Feb 9 09:14:24.509918 sshd[2532]: pam_faillock(sshd:auth): User unknown Feb 9 09:14:24.508000 audit[2532]: USER_AUTH pid=2532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vahidghaemifard" exe="/usr/sbin/sshd" hostname=152.136.161.237 addr=152.136.161.237 terminal=ssh res=failed' Feb 9 09:14:24.645138 kubelet[1435]: E0209 09:14:24.645060 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:24.735847 kubelet[1435]: I0209 09:14:24.735594 1435 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 09:14:24.736563 kubelet[1435]: I0209 09:14:24.736139 1435 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 09:14:25.034928 kubelet[1435]: I0209 09:14:25.034850 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-f2dkv" podStartSLOduration=-9.22337199681997e+09 pod.CreationTimestamp="2024-02-09 09:13:45 +0000 UTC" firstStartedPulling="2024-02-09 09:14:20.375769107 +0000 UTC m=+48.768402094" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:25.034356638 +0000 UTC m=+53.426989638" watchObservedRunningTime="2024-02-09 09:14:25.034807297 +0000 UTC m=+53.427440286" Feb 9 09:14:25.646244 kubelet[1435]: E0209 09:14:25.646107 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:25.888165 env[1105]: time="2024-02-09T09:14:25.888105527Z" level=info msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.946 [INFO][2594] k8s.go 578: Cleaning up netns ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.946 [INFO][2594] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" iface="eth0" netns="/var/run/netns/cni-f790d655-606d-3078-3851-74d854f0fd8c" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.946 [INFO][2594] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" iface="eth0" netns="/var/run/netns/cni-f790d655-606d-3078-3851-74d854f0fd8c" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.947 [INFO][2594] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" iface="eth0" netns="/var/run/netns/cni-f790d655-606d-3078-3851-74d854f0fd8c" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.947 [INFO][2594] k8s.go 585: Releasing IP address(es) ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.947 [INFO][2594] utils.go 188: Calico CNI releasing IP address ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.970 [INFO][2600] ipam_plugin.go 415: Releasing address using handleID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.970 [INFO][2600] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.970 [INFO][2600] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.981 [WARNING][2600] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.981 [INFO][2600] ipam_plugin.go 443: Releasing address using workloadID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.984 [INFO][2600] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:25.987374 env[1105]: 2024-02-09 09:14:25.985 [INFO][2594] k8s.go 591: Teardown processing complete. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:25.988556 env[1105]: time="2024-02-09T09:14:25.988460496Z" level=info msg="TearDown network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" successfully" Feb 9 09:14:25.988752 env[1105]: time="2024-02-09T09:14:25.988719568Z" level=info msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" returns successfully" Feb 9 09:14:25.991078 systemd[1]: run-netns-cni\x2df790d655\x2d606d\x2d3078\x2d3851\x2d74d854f0fd8c.mount: Deactivated successfully. Feb 9 09:14:25.993479 env[1105]: time="2024-02-09T09:14:25.993428447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9s5sc,Uid:d5b4cd86-7f00-438b-b728-8a8192745d03,Namespace:default,Attempt:1,}" Feb 9 09:14:26.171183 systemd-networkd[1000]: cali1da5d62cbbc: Link UP Feb 9 09:14:26.174576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:14:26.174715 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1da5d62cbbc: link becomes ready Feb 9 09:14:26.174455 systemd-networkd[1000]: cali1da5d62cbbc: Gained carrier Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.058 [INFO][2606] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0 nginx-deployment-8ffc5cf85- default d5b4cd86-7f00-438b-b728-8a8192745d03 1044 0 2024-02-09 09:14:11 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 24.144.85.89 nginx-deployment-8ffc5cf85-9s5sc eth0 default [] [] [kns.default ksa.default.default] cali1da5d62cbbc [] []}} ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.058 [INFO][2606] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.096 [INFO][2620] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" HandleID="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.114 [INFO][2620] ipam_plugin.go 268: Auto assigning IP ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" HandleID="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"default", "node":"24.144.85.89", "pod":"nginx-deployment-8ffc5cf85-9s5sc", "timestamp":"2024-02-09 09:14:26.09650896 +0000 UTC"}, Hostname:"24.144.85.89", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.114 [INFO][2620] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.114 [INFO][2620] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.114 [INFO][2620] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '24.144.85.89' Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.119 [INFO][2620] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.127 [INFO][2620] ipam.go 372: Looking up existing affinities for host host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.135 [INFO][2620] ipam.go 489: Trying affinity for 192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.140 [INFO][2620] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.145 [INFO][2620] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.145 [INFO][2620] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.149 [INFO][2620] ipam.go 1682: Creating new handle: k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.155 [INFO][2620] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.163 [INFO][2620] ipam.go 1216: Successfully claimed IPs: [192.168.105.130/26] block=192.168.105.128/26 handle="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.163 [INFO][2620] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.130/26] handle="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" host="24.144.85.89" Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.163 [INFO][2620] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:26.189693 env[1105]: 2024-02-09 09:14:26.164 [INFO][2620] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.130/26] IPv6=[] ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" HandleID="k8s-pod-network.b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.165 [INFO][2606] k8s.go 385: Populated endpoint ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d5b4cd86-7f00-438b-b728-8a8192745d03", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-9s5sc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1da5d62cbbc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.165 [INFO][2606] k8s.go 386: Calico CNI using IPs: [192.168.105.130/32] ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.166 [INFO][2606] dataplane_linux.go 68: Setting the host side veth name to cali1da5d62cbbc ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.175 [INFO][2606] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.175 [INFO][2606] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d5b4cd86-7f00-438b-b728-8a8192745d03", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef", Pod:"nginx-deployment-8ffc5cf85-9s5sc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1da5d62cbbc", MAC:"d2:51:0e:13:14:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:26.190550 env[1105]: 2024-02-09 09:14:26.185 [INFO][2606] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9s5sc" WorkloadEndpoint="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:26.208411 env[1105]: time="2024-02-09T09:14:26.208293362Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:14:26.208411 env[1105]: time="2024-02-09T09:14:26.208352668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:14:26.208951 env[1105]: time="2024-02-09T09:14:26.208745142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:14:26.209064 env[1105]: time="2024-02-09T09:14:26.209001985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef pid=2651 runtime=io.containerd.runc.v2 Feb 9 09:14:26.233798 systemd[1]: Started cri-containerd-b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef.scope. Feb 9 09:14:26.236000 audit[2669]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:26.236000 audit[2669]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc72341810 a2=0 a3=7ffc723417fc items=0 ppid=2209 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.236000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.258000 audit: BPF prog-id=98 op=LOAD Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383264656336633531303039396266353931666332356461343339 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383264656336633531303039396266353931666332356461343339 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.259000 audit: BPF prog-id=99 op=LOAD Feb 9 09:14:26.259000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028e9c0 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383264656336633531303039396266353931666332356461343339 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.260000 audit: BPF prog-id=100 op=LOAD Feb 9 09:14:26.260000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ea08 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383264656336633531303039396266353931666332356461343339 Feb 9 09:14:26.261000 audit: BPF prog-id=100 op=UNLOAD Feb 9 09:14:26.261000 audit: BPF prog-id=99 op=UNLOAD Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:26.261000 audit: BPF prog-id=101 op=LOAD Feb 9 09:14:26.261000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028ee18 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:26.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383264656336633531303039396266353931666332356461343339 Feb 9 09:14:26.301349 env[1105]: time="2024-02-09T09:14:26.301276603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9s5sc,Uid:d5b4cd86-7f00-438b-b728-8a8192745d03,Namespace:default,Attempt:1,} returns sandbox id \"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef\"" Feb 9 09:14:26.304027 env[1105]: time="2024-02-09T09:14:26.303971616Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 09:14:26.520729 sshd[2532]: Failed password for invalid user vahidghaemifard from 152.136.161.237 port 53556 ssh2 Feb 9 09:14:26.647080 kubelet[1435]: E0209 09:14:26.647009 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:26.916812 sshd[2532]: Received disconnect from 152.136.161.237 port 53556:11: Bye Bye [preauth] Feb 9 09:14:26.916812 sshd[2532]: Disconnected from invalid user vahidghaemifard 152.136.161.237 port 53556 [preauth] Feb 9 09:14:26.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-24.144.85.89:22-152.136.161.237:53556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:14:26.918397 systemd[1]: sshd@13-24.144.85.89:22-152.136.161.237:53556.service: Deactivated successfully. Feb 9 09:14:26.990930 systemd[1]: run-containerd-runc-k8s.io-b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef-runc.VJgQqa.mount: Deactivated successfully. Feb 9 09:14:27.647312 kubelet[1435]: E0209 09:14:27.647252 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:27.928651 systemd-networkd[1000]: cali1da5d62cbbc: Gained IPv6LL Feb 9 09:14:28.649177 kubelet[1435]: E0209 09:14:28.649082 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:29.650078 kubelet[1435]: E0209 09:14:29.650000 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:30.269223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1815638300.mount: Deactivated successfully. Feb 9 09:14:30.650259 kubelet[1435]: E0209 09:14:30.650202 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:31.533504 env[1105]: time="2024-02-09T09:14:31.533426766Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:31.535810 env[1105]: time="2024-02-09T09:14:31.535748252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:31.538241 env[1105]: time="2024-02-09T09:14:31.538165996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:31.541174 env[1105]: time="2024-02-09T09:14:31.541107922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:31.541445 env[1105]: time="2024-02-09T09:14:31.541400515Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 09:14:31.544386 env[1105]: time="2024-02-09T09:14:31.544323390Z" level=info msg="CreateContainer within sandbox \"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 09:14:31.556173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307650163.mount: Deactivated successfully. Feb 9 09:14:31.563791 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2357562488.mount: Deactivated successfully. Feb 9 09:14:31.571646 env[1105]: time="2024-02-09T09:14:31.571570493Z" level=info msg="CreateContainer within sandbox \"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b270691882480421ac28b11dc290613aae1925cd2cbcb23ed79172286c2cea27\"" Feb 9 09:14:31.572577 env[1105]: time="2024-02-09T09:14:31.572523400Z" level=info msg="StartContainer for \"b270691882480421ac28b11dc290613aae1925cd2cbcb23ed79172286c2cea27\"" Feb 9 09:14:31.596280 systemd[1]: Started cri-containerd-b270691882480421ac28b11dc290613aae1925cd2cbcb23ed79172286c2cea27.scope. Feb 9 09:14:31.621319 kernel: kauditd_printk_skb: 139 callbacks suppressed Feb 9 09:14:31.621476 kernel: audit: type=1400 audit(1707470071.615:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.621638 kernel: audit: type=1400 audit(1707470071.615:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.631334 kernel: audit: type=1400 audit(1707470071.615:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.631608 kernel: audit: type=1400 audit(1707470071.615:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.631686 kernel: audit: type=1400 audit(1707470071.615:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.634599 kernel: audit: type=1400 audit(1707470071.615:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.641195 kernel: audit: type=1400 audit(1707470071.615:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.641414 kernel: audit: type=1400 audit(1707470071.615:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.648604 kernel: audit: type=1400 audit(1707470071.615:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.648724 kernel: audit: type=1400 audit(1707470071.619:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.651203 kubelet[1435]: E0209 09:14:31.651112 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:31.619000 audit: BPF prog-id=102 op=LOAD Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2651 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:31.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373036393138383234383034323161633238623131646332393036 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2651 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:31.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373036393138383234383034323161633238623131646332393036 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit: BPF prog-id=103 op=LOAD Feb 9 09:14:31.623000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6de0 items=0 ppid=2651 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:31.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373036393138383234383034323161633238623131646332393036 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit: BPF prog-id=104 op=LOAD Feb 9 09:14:31.623000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a6e28 items=0 ppid=2651 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:31.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373036393138383234383034323161633238623131646332393036 Feb 9 09:14:31.623000 audit: BPF prog-id=104 op=UNLOAD Feb 9 09:14:31.623000 audit: BPF prog-id=103 op=UNLOAD Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:31.623000 audit: BPF prog-id=105 op=LOAD Feb 9 09:14:31.623000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7238 items=0 ppid=2651 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:31.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373036393138383234383034323161633238623131646332393036 Feb 9 09:14:31.670767 env[1105]: time="2024-02-09T09:14:31.670713555Z" level=info msg="StartContainer for \"b270691882480421ac28b11dc290613aae1925cd2cbcb23ed79172286c2cea27\" returns successfully" Feb 9 09:14:32.062651 kubelet[1435]: I0209 09:14:32.062603 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-9s5sc" podStartSLOduration=-9.223372015792263e+09 pod.CreationTimestamp="2024-02-09 09:14:11 +0000 UTC" firstStartedPulling="2024-02-09 09:14:26.303137648 +0000 UTC m=+54.695770627" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:32.062392967 +0000 UTC m=+60.455025970" watchObservedRunningTime="2024-02-09 09:14:32.062512825 +0000 UTC m=+60.455145839" Feb 9 09:14:32.604689 kubelet[1435]: E0209 09:14:32.604613 1435 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:32.620388 env[1105]: time="2024-02-09T09:14:32.620333911Z" level=info msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" Feb 9 09:14:32.652089 kubelet[1435]: E0209 09:14:32.652041 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.682 [WARNING][2767] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-csi--node--driver--f2dkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d58be710-d7c7-4efd-a385-d6a5cc2049b4", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 13, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390", Pod:"csi-node-driver-f2dkv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali49af0143339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.682 [INFO][2767] k8s.go 578: Cleaning up netns ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.682 [INFO][2767] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" iface="eth0" netns="" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.682 [INFO][2767] k8s.go 585: Releasing IP address(es) ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.682 [INFO][2767] utils.go 188: Calico CNI releasing IP address ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.707 [INFO][2773] ipam_plugin.go 415: Releasing address using handleID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.707 [INFO][2773] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.708 [INFO][2773] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.735 [WARNING][2773] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.735 [INFO][2773] ipam_plugin.go 443: Releasing address using workloadID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.739 [INFO][2773] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:32.742750 env[1105]: 2024-02-09 09:14:32.741 [INFO][2767] k8s.go 591: Teardown processing complete. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.743684 env[1105]: time="2024-02-09T09:14:32.743637422Z" level=info msg="TearDown network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" successfully" Feb 9 09:14:32.743802 env[1105]: time="2024-02-09T09:14:32.743687988Z" level=info msg="StopPodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" returns successfully" Feb 9 09:14:32.744455 env[1105]: time="2024-02-09T09:14:32.744398706Z" level=info msg="RemovePodSandbox for \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" Feb 9 09:14:32.744628 env[1105]: time="2024-02-09T09:14:32.744449587Z" level=info msg="Forcibly stopping sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\"" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.814 [WARNING][2793] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-csi--node--driver--f2dkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d58be710-d7c7-4efd-a385-d6a5cc2049b4", ResourceVersion:"1040", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 13, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"f71a5dbb16e2de52c5b0dd73aba51059db9d384382da4f42b3d0354c4dc72390", Pod:"csi-node-driver-f2dkv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali49af0143339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.814 [INFO][2793] k8s.go 578: Cleaning up netns ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.814 [INFO][2793] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" iface="eth0" netns="" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.814 [INFO][2793] k8s.go 585: Releasing IP address(es) ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.815 [INFO][2793] utils.go 188: Calico CNI releasing IP address ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.839 [INFO][2799] ipam_plugin.go 415: Releasing address using handleID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.839 [INFO][2799] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.840 [INFO][2799] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.884 [WARNING][2799] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.884 [INFO][2799] ipam_plugin.go 443: Releasing address using workloadID ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" HandleID="k8s-pod-network.45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Workload="24.144.85.89-k8s-csi--node--driver--f2dkv-eth0" Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.889 [INFO][2799] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:32.892758 env[1105]: 2024-02-09 09:14:32.891 [INFO][2793] k8s.go 591: Teardown processing complete. ContainerID="45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881" Feb 9 09:14:32.892758 env[1105]: time="2024-02-09T09:14:32.892684904Z" level=info msg="TearDown network for sandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" successfully" Feb 9 09:14:32.899279 env[1105]: time="2024-02-09T09:14:32.899213697Z" level=info msg="RemovePodSandbox \"45ad80567241045ce176623ac1a826a10165f26431a8c286b075a7aeca35d881\" returns successfully" Feb 9 09:14:32.899978 env[1105]: time="2024-02-09T09:14:32.899940015Z" level=info msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.955 [WARNING][2820] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d5b4cd86-7f00-438b-b728-8a8192745d03", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef", Pod:"nginx-deployment-8ffc5cf85-9s5sc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1da5d62cbbc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.956 [INFO][2820] k8s.go 578: Cleaning up netns ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.956 [INFO][2820] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" iface="eth0" netns="" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.956 [INFO][2820] k8s.go 585: Releasing IP address(es) ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.956 [INFO][2820] utils.go 188: Calico CNI releasing IP address ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.980 [INFO][2826] ipam_plugin.go 415: Releasing address using handleID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.980 [INFO][2826] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.980 [INFO][2826] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.992 [WARNING][2826] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:32.992 [INFO][2826] ipam_plugin.go 443: Releasing address using workloadID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:33.000 [INFO][2826] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:33.003955 env[1105]: 2024-02-09 09:14:33.001 [INFO][2820] k8s.go 591: Teardown processing complete. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.004753 env[1105]: time="2024-02-09T09:14:33.004689009Z" level=info msg="TearDown network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" successfully" Feb 9 09:14:33.004818 env[1105]: time="2024-02-09T09:14:33.004753202Z" level=info msg="StopPodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" returns successfully" Feb 9 09:14:33.005577 env[1105]: time="2024-02-09T09:14:33.005508176Z" level=info msg="RemovePodSandbox for \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" Feb 9 09:14:33.005705 env[1105]: time="2024-02-09T09:14:33.005593521Z" level=info msg="Forcibly stopping sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\"" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.056 [WARNING][2844] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d5b4cd86-7f00-438b-b728-8a8192745d03", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"b582dec6c510099bf591fc25da439de444013f248eaa6c46bccbbba1121c17ef", Pod:"nginx-deployment-8ffc5cf85-9s5sc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1da5d62cbbc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.056 [INFO][2844] k8s.go 578: Cleaning up netns ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.056 [INFO][2844] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" iface="eth0" netns="" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.056 [INFO][2844] k8s.go 585: Releasing IP address(es) ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.056 [INFO][2844] utils.go 188: Calico CNI releasing IP address ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.077 [INFO][2850] ipam_plugin.go 415: Releasing address using handleID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.077 [INFO][2850] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.077 [INFO][2850] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.089 [WARNING][2850] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.089 [INFO][2850] ipam_plugin.go 443: Releasing address using workloadID ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" HandleID="k8s-pod-network.975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Workload="24.144.85.89-k8s-nginx--deployment--8ffc5cf85--9s5sc-eth0" Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.092 [INFO][2850] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:33.095308 env[1105]: 2024-02-09 09:14:33.094 [INFO][2844] k8s.go 591: Teardown processing complete. ContainerID="975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd" Feb 9 09:14:33.096073 env[1105]: time="2024-02-09T09:14:33.095348404Z" level=info msg="TearDown network for sandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" successfully" Feb 9 09:14:33.099085 env[1105]: time="2024-02-09T09:14:33.099028172Z" level=info msg="RemovePodSandbox \"975cd35d914fd3d00abc61bc22b92f4385a3695ef4197ce45e0ad89d024ae9dd\" returns successfully" Feb 9 09:14:33.653085 kubelet[1435]: E0209 09:14:33.653007 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:34.654042 kubelet[1435]: E0209 09:14:34.653958 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:35.244000 audit[2882]: NETFILTER_CFG table=filter:85 family=2 entries=18 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:35.244000 audit[2882]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd5066c9c0 a2=0 a3=7ffd5066c9ac items=0 ppid=1747 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:35.247000 audit[2882]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=2882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:35.247000 audit[2882]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd5066c9c0 a2=0 a3=7ffd5066c9ac items=0 ppid=1747 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:35.287470 kubelet[1435]: I0209 09:14:35.287416 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:14:35.295875 systemd[1]: Created slice kubepods-besteffort-poddb3e30d3_9312_4307_bdde_a054b3092575.slice. Feb 9 09:14:35.331000 audit[2911]: NETFILTER_CFG table=filter:87 family=2 entries=30 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:35.331000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff2e604a90 a2=0 a3=7fff2e604a7c items=0 ppid=1747 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:35.333000 audit[2911]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:35.333000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff2e604a90 a2=0 a3=7fff2e604a7c items=0 ppid=1747 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:35.474465 kubelet[1435]: I0209 09:14:35.474335 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/db3e30d3-9312-4307-bdde-a054b3092575-data\") pod \"nfs-server-provisioner-0\" (UID: \"db3e30d3-9312-4307-bdde-a054b3092575\") " pod="default/nfs-server-provisioner-0" Feb 9 09:14:35.474832 kubelet[1435]: I0209 09:14:35.474500 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hgb6g\" (UniqueName: \"kubernetes.io/projected/db3e30d3-9312-4307-bdde-a054b3092575-kube-api-access-hgb6g\") pod \"nfs-server-provisioner-0\" (UID: \"db3e30d3-9312-4307-bdde-a054b3092575\") " pod="default/nfs-server-provisioner-0" Feb 9 09:14:35.601652 env[1105]: time="2024-02-09T09:14:35.601571372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:db3e30d3-9312-4307-bdde-a054b3092575,Namespace:default,Attempt:0,}" Feb 9 09:14:35.654865 kubelet[1435]: E0209 09:14:35.654811 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:35.842549 systemd-networkd[1000]: cali60e51b789ff: Link UP Feb 9 09:14:35.848279 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:14:35.848485 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 09:14:35.857313 systemd-networkd[1000]: cali60e51b789ff: Gained carrier Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.700 [INFO][2914] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {24.144.85.89-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default db3e30d3-9312-4307-bdde-a054b3092575 1092 0 2024-02-09 09:14:35 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 24.144.85.89 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.700 [INFO][2914] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.746 [INFO][2924] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" HandleID="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Workload="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.777 [INFO][2924] ipam_plugin.go 268: Auto assigning IP ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" HandleID="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Workload="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f0a00), Attrs:map[string]string{"namespace":"default", "node":"24.144.85.89", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 09:14:35.746797308 +0000 UTC"}, Hostname:"24.144.85.89", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.778 [INFO][2924] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.778 [INFO][2924] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.778 [INFO][2924] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '24.144.85.89' Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.782 [INFO][2924] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.792 [INFO][2924] ipam.go 372: Looking up existing affinities for host host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.801 [INFO][2924] ipam.go 489: Trying affinity for 192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.805 [INFO][2924] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.809 [INFO][2924] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.809 [INFO][2924] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.812 [INFO][2924] ipam.go 1682: Creating new handle: k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8 Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.819 [INFO][2924] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.828 [INFO][2924] ipam.go 1216: Successfully claimed IPs: [192.168.105.131/26] block=192.168.105.128/26 handle="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.828 [INFO][2924] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.131/26] handle="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" host="24.144.85.89" Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.829 [INFO][2924] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:35.877441 env[1105]: 2024-02-09 09:14:35.829 [INFO][2924] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.131/26] IPv6=[] ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" HandleID="k8s-pod-network.33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Workload="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.878506 env[1105]: 2024-02-09 09:14:35.832 [INFO][2914] k8s.go 385: Populated endpoint ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"db3e30d3-9312-4307-bdde-a054b3092575", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:35.878506 env[1105]: 2024-02-09 09:14:35.832 [INFO][2914] k8s.go 386: Calico CNI using IPs: [192.168.105.131/32] ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.878506 env[1105]: 2024-02-09 09:14:35.832 [INFO][2914] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.878506 env[1105]: 2024-02-09 09:14:35.856 [INFO][2914] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.878956 env[1105]: 2024-02-09 09:14:35.857 [INFO][2914] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"db3e30d3-9312-4307-bdde-a054b3092575", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:23:ad:ba:12:d3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:35.878956 env[1105]: 2024-02-09 09:14:35.874 [INFO][2914] k8s.go 491: Wrote updated endpoint to datastore ContainerID="33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="24.144.85.89-k8s-nfs--server--provisioner--0-eth0" Feb 9 09:14:35.905832 env[1105]: time="2024-02-09T09:14:35.905229464Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:14:35.905832 env[1105]: time="2024-02-09T09:14:35.905310882Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:14:35.905832 env[1105]: time="2024-02-09T09:14:35.905330119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:14:35.905832 env[1105]: time="2024-02-09T09:14:35.905620253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8 pid=2954 runtime=io.containerd.runc.v2 Feb 9 09:14:35.923000 audit[2969]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:35.923000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffdd5b4f6e0 a2=0 a3=7ffdd5b4f6cc items=0 ppid=2209 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:35.934075 systemd[1]: Started cri-containerd-33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8.scope. Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.969000 audit: BPF prog-id=106 op=LOAD Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2954 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643333623233373866646262336331383138333135663164653334 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2954 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643333623233373866646262336331383138333135663164653334 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit: BPF prog-id=107 op=LOAD Feb 9 09:14:35.971000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000290ce0 items=0 ppid=2954 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643333623233373866646262336331383138333135663164653334 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit: BPF prog-id=108 op=LOAD Feb 9 09:14:35.971000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000290d28 items=0 ppid=2954 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643333623233373866646262336331383138333135663164653334 Feb 9 09:14:35.971000 audit: BPF prog-id=108 op=UNLOAD Feb 9 09:14:35.971000 audit: BPF prog-id=107 op=UNLOAD Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:35.971000 audit: BPF prog-id=109 op=LOAD Feb 9 09:14:35.971000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000291138 items=0 ppid=2954 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:35.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643333623233373866646262336331383138333135663164653334 Feb 9 09:14:36.022618 env[1105]: time="2024-02-09T09:14:36.022443709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:db3e30d3-9312-4307-bdde-a054b3092575,Namespace:default,Attempt:0,} returns sandbox id \"33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8\"" Feb 9 09:14:36.026264 env[1105]: time="2024-02-09T09:14:36.026184800Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 09:14:36.592853 systemd[1]: run-containerd-runc-k8s.io-33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8-runc.9hBkCw.mount: Deactivated successfully. Feb 9 09:14:36.656146 kubelet[1435]: E0209 09:14:36.656080 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:36.951955 systemd-networkd[1000]: cali60e51b789ff: Gained IPv6LL Feb 9 09:14:37.657213 kubelet[1435]: E0209 09:14:37.657053 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:38.657810 kubelet[1435]: E0209 09:14:38.657620 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:39.636840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount344674415.mount: Deactivated successfully. Feb 9 09:14:39.658126 kubelet[1435]: E0209 09:14:39.658070 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:40.639140 systemd[1]: run-containerd-runc-k8s.io-f273d9cc62c9a68537797e28b7ab38dac50f1bab473b10415a3f8a32dc362ffa-runc.MlqISi.mount: Deactivated successfully. Feb 9 09:14:40.659587 kubelet[1435]: E0209 09:14:40.658879 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:40.756441 kubelet[1435]: E0209 09:14:40.756397 1435 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 9 09:14:41.660016 kubelet[1435]: E0209 09:14:41.659944 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:42.434431 env[1105]: time="2024-02-09T09:14:42.434345937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:42.437745 env[1105]: time="2024-02-09T09:14:42.437688096Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:42.441966 env[1105]: time="2024-02-09T09:14:42.441915301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:42.444009 env[1105]: time="2024-02-09T09:14:42.443952996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:42.445032 env[1105]: time="2024-02-09T09:14:42.444989605Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 09:14:42.448021 env[1105]: time="2024-02-09T09:14:42.447952492Z" level=info msg="CreateContainer within sandbox \"33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 09:14:42.461456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount306502068.mount: Deactivated successfully. Feb 9 09:14:42.468242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount873690027.mount: Deactivated successfully. Feb 9 09:14:42.475636 env[1105]: time="2024-02-09T09:14:42.475520842Z" level=info msg="CreateContainer within sandbox \"33d33b2378fdbb3c1818315f1de342d5b0f5654f087c50ae005670f23cffd4f8\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8256cc89265f3cab95aa8a70b7818cfd290b2a25b3ea7c11631de9e256a42e80\"" Feb 9 09:14:42.476684 env[1105]: time="2024-02-09T09:14:42.476607169Z" level=info msg="StartContainer for \"8256cc89265f3cab95aa8a70b7818cfd290b2a25b3ea7c11631de9e256a42e80\"" Feb 9 09:14:42.507650 systemd[1]: Started cri-containerd-8256cc89265f3cab95aa8a70b7818cfd290b2a25b3ea7c11631de9e256a42e80.scope. Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529482 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 9 09:14:42.529726 kernel: audit: type=1400 audit(1707470082.524:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.537587 kernel: audit: type=1400 audit(1707470082.524:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.537733 kernel: audit: type=1400 audit(1707470082.524:839): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.537859 kernel: audit: type=1400 audit(1707470082.524:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.544227 kernel: audit: type=1400 audit(1707470082.524:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.550442 kernel: audit: type=1400 audit(1707470082.524:842): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.550694 kernel: audit: type=1400 audit(1707470082.524:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.557296 kernel: audit: type=1400 audit(1707470082.524:844): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.557603 kernel: audit: type=1400 audit(1707470082.524:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.563995 kernel: audit: type=1400 audit(1707470082.524:846): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.524000 audit: BPF prog-id=110 op=LOAD Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2954 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:42.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832353663633839323635663363616239356161386137306237383138 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2954 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:42.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832353663633839323635663363616239356161386137306237383138 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit: BPF prog-id=111 op=LOAD Feb 9 09:14:42.529000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0120 items=0 ppid=2954 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:42.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832353663633839323635663363616239356161386137306237383138 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit: BPF prog-id=112 op=LOAD Feb 9 09:14:42.529000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0168 items=0 ppid=2954 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:42.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832353663633839323635663363616239356161386137306237383138 Feb 9 09:14:42.529000 audit: BPF prog-id=112 op=UNLOAD Feb 9 09:14:42.529000 audit: BPF prog-id=111 op=UNLOAD Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:42.529000 audit: BPF prog-id=113 op=LOAD Feb 9 09:14:42.529000 audit[3027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0578 items=0 ppid=2954 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:42.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832353663633839323635663363616239356161386137306237383138 Feb 9 09:14:42.575227 env[1105]: time="2024-02-09T09:14:42.575167487Z" level=info msg="StartContainer for \"8256cc89265f3cab95aa8a70b7818cfd290b2a25b3ea7c11631de9e256a42e80\" returns successfully" Feb 9 09:14:42.644000 audit[3054]: AVC avc: denied { search } for pid=3054 comm="rpcbind" name="crypto" dev="proc" ino=24724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:14:42.644000 audit[3054]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7999ab40c0 a2=0 a3=0 items=0 ppid=3037 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 key=(null) Feb 9 09:14:42.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 09:14:42.660402 kubelet[1435]: E0209 09:14:42.660354 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:42.687000 audit[3059]: AVC avc: denied { search } for pid=3059 comm="dbus-daemon" name="crypto" dev="proc" ino=24724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:14:42.687000 audit[3059]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f12276ad0c0 a2=0 a3=0 items=0 ppid=3037 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 key=(null) Feb 9 09:14:42.687000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 09:14:42.693000 audit[3060]: AVC avc: denied { watch } for pid=3060 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538080 scontext=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c85,c872 tclass=dir permissive=0 Feb 9 09:14:42.693000 audit[3060]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55b5875a0970 a2=2c8 a3=7fff272a0d6c items=0 ppid=3037 pid=3060 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 key=(null) Feb 9 09:14:42.693000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 09:14:42.699000 audit[3061]: AVC avc: denied { read } for pid=3061 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24750 scontext=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 09:14:42.699000 audit[3061]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fae4259d320 a1=80000 a2=d a3=7fffe23cf050 items=0 ppid=3037 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 key=(null) Feb 9 09:14:42.699000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 09:14:42.701000 audit[3061]: AVC avc: denied { search } for pid=3061 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24724 scontext=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 09:14:42.701000 audit[3061]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fae41af10c0 a2=0 a3=0 items=0 ppid=3037 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c85,c872 key=(null) Feb 9 09:14:42.701000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 09:14:43.222000 audit[3104]: NETFILTER_CFG table=filter:90 family=2 entries=18 op=nft_register_rule pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:43.222000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffeb69013b0 a2=0 a3=7ffeb690139c items=0 ppid=1747 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:43.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:43.228000 audit[3104]: NETFILTER_CFG table=nat:91 family=2 entries=162 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:43.228000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffeb69013b0 a2=0 a3=7ffeb690139c items=0 ppid=1747 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:43.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:43.661373 kubelet[1435]: E0209 09:14:43.661312 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:44.662027 kubelet[1435]: E0209 09:14:44.661973 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:44.839413 kubelet[1435]: I0209 09:14:44.839375 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372027015451e+09 pod.CreationTimestamp="2024-02-09 09:14:35 +0000 UTC" firstStartedPulling="2024-02-09 09:14:36.025377528 +0000 UTC m=+64.418010535" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:43.152810451 +0000 UTC m=+71.545443442" watchObservedRunningTime="2024-02-09 09:14:44.839324006 +0000 UTC m=+73.231957007" Feb 9 09:14:44.839936 kubelet[1435]: I0209 09:14:44.839911 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:14:44.846587 systemd[1]: Created slice kubepods-besteffort-pod8882c1b8_e29d_4bee_b0bc_3c9d32fb773a.slice. Feb 9 09:14:44.898000 audit[3131]: NETFILTER_CFG table=filter:92 family=2 entries=7 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:44.898000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd5fd808b0 a2=0 a3=7ffd5fd8089c items=0 ppid=1747 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:44.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:44.904000 audit[3131]: NETFILTER_CFG table=nat:93 family=2 entries=198 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:44.904000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd5fd808b0 a2=0 a3=7ffd5fd8089c items=0 ppid=1747 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:44.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:44.964000 audit[3157]: NETFILTER_CFG table=filter:94 family=2 entries=8 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:44.964000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd8a2c4f00 a2=0 a3=7ffd8a2c4eec items=0 ppid=1747 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:44.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:44.971000 audit[3157]: NETFILTER_CFG table=nat:95 family=2 entries=198 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:44.971000 audit[3157]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd8a2c4f00 a2=0 a3=7ffd8a2c4eec items=0 ppid=1747 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:44.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:45.036878 kubelet[1435]: I0209 09:14:45.036819 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8882c1b8-e29d-4bee-b0bc-3c9d32fb773a-calico-apiserver-certs\") pod \"calico-apiserver-7d84f796bc-smwkw\" (UID: \"8882c1b8-e29d-4bee-b0bc-3c9d32fb773a\") " pod="calico-apiserver/calico-apiserver-7d84f796bc-smwkw" Feb 9 09:14:45.037174 kubelet[1435]: I0209 09:14:45.037152 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hlbtn\" (UniqueName: \"kubernetes.io/projected/8882c1b8-e29d-4bee-b0bc-3c9d32fb773a-kube-api-access-hlbtn\") pod \"calico-apiserver-7d84f796bc-smwkw\" (UID: \"8882c1b8-e29d-4bee-b0bc-3c9d32fb773a\") " pod="calico-apiserver/calico-apiserver-7d84f796bc-smwkw" Feb 9 09:14:45.139231 kubelet[1435]: E0209 09:14:45.139184 1435 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 09:14:45.139446 kubelet[1435]: E0209 09:14:45.139280 1435 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/8882c1b8-e29d-4bee-b0bc-3c9d32fb773a-calico-apiserver-certs podName:8882c1b8-e29d-4bee-b0bc-3c9d32fb773a nodeName:}" failed. No retries permitted until 2024-02-09 09:14:45.639256653 +0000 UTC m=+74.031889641 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/8882c1b8-e29d-4bee-b0bc-3c9d32fb773a-calico-apiserver-certs") pod "calico-apiserver-7d84f796bc-smwkw" (UID: "8882c1b8-e29d-4bee-b0bc-3c9d32fb773a") : secret "calico-apiserver-certs" not found Feb 9 09:14:45.663806 kubelet[1435]: E0209 09:14:45.663669 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:45.751552 env[1105]: time="2024-02-09T09:14:45.751468928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d84f796bc-smwkw,Uid:8882c1b8-e29d-4bee-b0bc-3c9d32fb773a,Namespace:calico-apiserver,Attempt:0,}" Feb 9 09:14:45.994785 systemd-networkd[1000]: cali5d39be352fd: Link UP Feb 9 09:14:45.998803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:14:45.999159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d39be352fd: link becomes ready Feb 9 09:14:45.999687 systemd-networkd[1000]: cali5d39be352fd: Gained carrier Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.836 [INFO][3160] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0 calico-apiserver-7d84f796bc- calico-apiserver 8882c1b8-e29d-4bee-b0bc-3c9d32fb773a 1174 0 2024-02-09 09:14:44 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d84f796bc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 24.144.85.89 calico-apiserver-7d84f796bc-smwkw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5d39be352fd [] []}} ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.836 [INFO][3160] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.876 [INFO][3172] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" HandleID="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Workload="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.897 [INFO][3172] ipam_plugin.go 268: Auto assigning IP ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" HandleID="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Workload="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"24.144.85.89", "pod":"calico-apiserver-7d84f796bc-smwkw", "timestamp":"2024-02-09 09:14:45.876614164 +0000 UTC"}, Hostname:"24.144.85.89", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.897 [INFO][3172] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.897 [INFO][3172] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.897 [INFO][3172] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '24.144.85.89' Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.901 [INFO][3172] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.913 [INFO][3172] ipam.go 372: Looking up existing affinities for host host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.930 [INFO][3172] ipam.go 489: Trying affinity for 192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.937 [INFO][3172] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.949 [INFO][3172] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.949 [INFO][3172] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.957 [INFO][3172] ipam.go 1682: Creating new handle: k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0 Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.966 [INFO][3172] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.981 [INFO][3172] ipam.go 1216: Successfully claimed IPs: [192.168.105.132/26] block=192.168.105.128/26 handle="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.981 [INFO][3172] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.132/26] handle="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" host="24.144.85.89" Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.981 [INFO][3172] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:14:46.036577 env[1105]: 2024-02-09 09:14:45.981 [INFO][3172] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.132/26] IPv6=[] ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" HandleID="k8s-pod-network.a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Workload="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:45.983 [INFO][3160] k8s.go 385: Populated endpoint ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0", GenerateName:"calico-apiserver-7d84f796bc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8882c1b8-e29d-4bee-b0bc-3c9d32fb773a", ResourceVersion:"1174", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d84f796bc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"", Pod:"calico-apiserver-7d84f796bc-smwkw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5d39be352fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:45.984 [INFO][3160] k8s.go 386: Calico CNI using IPs: [192.168.105.132/32] ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:45.984 [INFO][3160] dataplane_linux.go 68: Setting the host side veth name to cali5d39be352fd ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:46.000 [INFO][3160] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:46.001 [INFO][3160] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0", GenerateName:"calico-apiserver-7d84f796bc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8882c1b8-e29d-4bee-b0bc-3c9d32fb773a", ResourceVersion:"1174", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d84f796bc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0", Pod:"calico-apiserver-7d84f796bc-smwkw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5d39be352fd", MAC:"6e:1a:4a:e4:a2:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:14:46.037397 env[1105]: 2024-02-09 09:14:46.034 [INFO][3160] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0" Namespace="calico-apiserver" Pod="calico-apiserver-7d84f796bc-smwkw" WorkloadEndpoint="24.144.85.89-k8s-calico--apiserver--7d84f796bc--smwkw-eth0" Feb 9 09:14:46.055501 env[1105]: time="2024-02-09T09:14:46.055414349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:14:46.055795 env[1105]: time="2024-02-09T09:14:46.055733668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:14:46.055915 env[1105]: time="2024-02-09T09:14:46.055890892Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:14:46.056201 env[1105]: time="2024-02-09T09:14:46.056170281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0 pid=3201 runtime=io.containerd.runc.v2 Feb 9 09:14:46.088817 systemd[1]: Started cri-containerd-a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0.scope. Feb 9 09:14:46.106000 audit[3228]: NETFILTER_CFG table=filter:96 family=2 entries=55 op=nft_register_chain pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:14:46.106000 audit[3228]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffc6b796c50 a2=0 a3=7ffc6b796c3c items=0 ppid=2209 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.106000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.115000 audit: BPF prog-id=114 op=LOAD Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3201 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663161363430373362313331326163613332316534653263656161 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3201 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663161363430373362313331326163613332316534653263656161 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit: BPF prog-id=115 op=LOAD Feb 9 09:14:46.116000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e2c80 items=0 ppid=3201 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663161363430373362313331326163613332316534653263656161 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit: BPF prog-id=116 op=LOAD Feb 9 09:14:46.116000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e2cc8 items=0 ppid=3201 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663161363430373362313331326163613332316534653263656161 Feb 9 09:14:46.116000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:14:46.116000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:46.116000 audit: BPF prog-id=117 op=LOAD Feb 9 09:14:46.116000 audit[3216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e30d8 items=0 ppid=3201 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:46.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663161363430373362313331326163613332316534653263656161 Feb 9 09:14:46.157812 env[1105]: time="2024-02-09T09:14:46.157757265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d84f796bc-smwkw,Uid:8882c1b8-e29d-4bee-b0bc-3c9d32fb773a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0\"" Feb 9 09:14:46.160117 env[1105]: time="2024-02-09T09:14:46.160049362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 09:14:46.665216 kubelet[1435]: E0209 09:14:46.664921 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:47.665563 kubelet[1435]: E0209 09:14:47.665451 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:48.023072 systemd-networkd[1000]: cali5d39be352fd: Gained IPv6LL Feb 9 09:14:48.666109 kubelet[1435]: E0209 09:14:48.666028 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:49.666607 kubelet[1435]: E0209 09:14:49.666370 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:50.666805 kubelet[1435]: E0209 09:14:50.666741 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:50.679094 env[1105]: time="2024-02-09T09:14:50.679039074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:50.681848 env[1105]: time="2024-02-09T09:14:50.681800428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:50.685076 env[1105]: time="2024-02-09T09:14:50.685017096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:50.687165 env[1105]: time="2024-02-09T09:14:50.687105487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:14:50.688365 env[1105]: time="2024-02-09T09:14:50.688316942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 09:14:50.692016 env[1105]: time="2024-02-09T09:14:50.691968242Z" level=info msg="CreateContainer within sandbox \"a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 09:14:50.704086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2179896797.mount: Deactivated successfully. Feb 9 09:14:50.711709 env[1105]: time="2024-02-09T09:14:50.711624851Z" level=info msg="CreateContainer within sandbox \"a5f1a64073b1312aca321e4e2ceaa698b51dc855e86a3897b533d12a443c80c0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0b54d2e2b2622d1d33e18cdc85af294129234d9902d78b6a748d3bbb0ed8ed68\"" Feb 9 09:14:50.712867 env[1105]: time="2024-02-09T09:14:50.712804525Z" level=info msg="StartContainer for \"0b54d2e2b2622d1d33e18cdc85af294129234d9902d78b6a748d3bbb0ed8ed68\"" Feb 9 09:14:50.738051 systemd[1]: Started cri-containerd-0b54d2e2b2622d1d33e18cdc85af294129234d9902d78b6a748d3bbb0ed8ed68.scope. Feb 9 09:14:50.766658 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 9 09:14:50.766827 kernel: audit: type=1400 audit(1707470090.761:885): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766860 kernel: audit: type=1400 audit(1707470090.761:886): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.769467 kernel: audit: type=1400 audit(1707470090.761:887): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.773414 kernel: audit: type=1400 audit(1707470090.761:888): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.781435 kernel: audit: type=1400 audit(1707470090.761:889): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.781675 kernel: audit: type=1400 audit(1707470090.761:890): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.787761 kernel: audit: type=1400 audit(1707470090.761:891): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.787818 kernel: audit: type=1400 audit(1707470090.761:892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.794831 kernel: audit: type=1400 audit(1707470090.761:893): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.804711 kernel: audit: type=1400 audit(1707470090.761:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.761000 audit: BPF prog-id=118 op=LOAD Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3201 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:50.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353464326532623236323264316433336531386364633835616632 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3201 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:50.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353464326532623236323264316433336531386364633835616632 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.766000 audit: BPF prog-id=119 op=LOAD Feb 9 09:14:50.766000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ee0a0 items=0 ppid=3201 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:50.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353464326532623236323264316433336531386364633835616632 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.772000 audit: BPF prog-id=120 op=LOAD Feb 9 09:14:50.772000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ee0e8 items=0 ppid=3201 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:50.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353464326532623236323264316433336531386364633835616632 Feb 9 09:14:50.777000 audit: BPF prog-id=120 op=UNLOAD Feb 9 09:14:50.777000 audit: BPF prog-id=119 op=UNLOAD Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { perfmon } for pid=3253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit[3253]: AVC avc: denied { bpf } for pid=3253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:14:50.777000 audit: BPF prog-id=121 op=LOAD Feb 9 09:14:50.777000 audit[3253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ee4f8 items=0 ppid=3201 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:50.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353464326532623236323264316433336531386364633835616632 Feb 9 09:14:50.850248 env[1105]: time="2024-02-09T09:14:50.850120334Z" level=info msg="StartContainer for \"0b54d2e2b2622d1d33e18cdc85af294129234d9902d78b6a748d3bbb0ed8ed68\" returns successfully" Feb 9 09:14:51.244000 audit[3310]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=3310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:51.244000 audit[3310]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffc7eb4280 a2=0 a3=7fffc7eb426c items=0 ppid=1747 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:51.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:51.249000 audit[3310]: NETFILTER_CFG table=nat:98 family=2 entries=198 op=nft_register_rule pid=3310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:51.249000 audit[3310]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffc7eb4280 a2=0 a3=7fffc7eb426c items=0 ppid=1747 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:51.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:51.585000 audit[3264]: AVC avc: denied { watch } for pid=3264 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_09_14_45.2327037188/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c306,c319 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c306,c319 tclass=file permissive=0 Feb 9 09:14:51.585000 audit[3264]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000adf0c0 a2=fc6 a3=0 items=0 ppid=3201 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c306,c319 key=(null) Feb 9 09:14:51.585000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 09:14:51.667876 kubelet[1435]: E0209 09:14:51.667689 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:52.005991 kubelet[1435]: I0209 09:14:52.005354 1435 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d84f796bc-smwkw" podStartSLOduration=-9.223372028849493e+09 pod.CreationTimestamp="2024-02-09 09:14:44 +0000 UTC" firstStartedPulling="2024-02-09 09:14:46.159321502 +0000 UTC m=+74.551954474" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:14:51.171964043 +0000 UTC m=+79.564597053" watchObservedRunningTime="2024-02-09 09:14:52.005282538 +0000 UTC m=+80.397915551" Feb 9 09:14:52.006680 kubelet[1435]: I0209 09:14:52.006654 1435 topology_manager.go:210] "Topology Admit Handler" Feb 9 09:14:52.013204 systemd[1]: Created slice kubepods-besteffort-pod84b5a757_f968_4bbc_a18d_7f2dc0e297b9.slice. Feb 9 09:14:52.180927 kubelet[1435]: I0209 09:14:52.180820 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5ed0afc4-37ad-4123-aa80-6ecf6d861292\" (UniqueName: \"kubernetes.io/nfs/84b5a757-f968-4bbc-a18d-7f2dc0e297b9-pvc-5ed0afc4-37ad-4123-aa80-6ecf6d861292\") pod \"test-pod-1\" (UID: \"84b5a757-f968-4bbc-a18d-7f2dc0e297b9\") " pod="default/test-pod-1" Feb 9 09:14:52.180927 kubelet[1435]: I0209 09:14:52.180914 1435 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f6plb\" (UniqueName: \"kubernetes.io/projected/84b5a757-f968-4bbc-a18d-7f2dc0e297b9-kube-api-access-f6plb\") pod \"test-pod-1\" (UID: \"84b5a757-f968-4bbc-a18d-7f2dc0e297b9\") " pod="default/test-pod-1" Feb 9 09:14:52.314000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.314000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.319894 kernel: Failed to create system directory netfs Feb 9 09:14:52.319992 kernel: Failed to create system directory netfs Feb 9 09:14:52.320016 kernel: Failed to create system directory netfs Feb 9 09:14:52.314000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.314000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.322213 kernel: Failed to create system directory netfs Feb 9 09:14:52.314000 audit[3314]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5627d8b145e0 a1=153bc a2=5627d6bb32b0 a3=5 items=0 ppid=50 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.314000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.339484 kernel: Failed to create system directory fscache Feb 9 09:14:52.339610 kernel: Failed to create system directory fscache Feb 9 09:14:52.339638 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.341883 kernel: Failed to create system directory fscache Feb 9 09:14:52.342035 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.344433 kernel: Failed to create system directory fscache Feb 9 09:14:52.344564 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.346847 kernel: Failed to create system directory fscache Feb 9 09:14:52.346958 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.349243 kernel: Failed to create system directory fscache Feb 9 09:14:52.349321 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.351610 kernel: Failed to create system directory fscache Feb 9 09:14:52.351806 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.331000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.353967 kernel: Failed to create system directory fscache Feb 9 09:14:52.331000 audit[3314]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5627d8d299c0 a1=4c0fc a2=5627d6bb32b0 a3=5 items=0 ppid=50 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.356646 kernel: FS-Cache: Loaded Feb 9 09:14:52.331000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.412521 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.412641 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.412675 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.413621 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.415803 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.415869 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.418022 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.418117 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.419107 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.420206 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.421317 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.422406 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.424584 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.424643 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.426765 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.426850 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.427858 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.428965 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.431072 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.431150 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.432235 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.433266 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.435574 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.435631 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.437777 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.437879 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.440035 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.440110 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.442305 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.442404 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.443438 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.445611 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.445709 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.446694 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.448981 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.449052 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.450115 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.452323 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.452409 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.453239 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.454034 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.455643 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.455721 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.457720 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.457790 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.459993 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.460186 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.470257 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.470384 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.471032 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.471867 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.472800 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.473619 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.475296 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.475359 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.476219 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.477135 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.478004 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.478838 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.479920 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.481376 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.481463 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.482194 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.483177 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.483891 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.484682 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.486343 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.486412 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.487177 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.488337 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.489136 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.489986 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.491855 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.491973 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.494430 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.494527 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.494593 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.495235 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.496240 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.497180 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.497993 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.499876 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.499977 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.500776 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.501702 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.503482 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.503873 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.504396 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.505198 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.506124 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.507005 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.507891 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.508704 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.510458 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.510504 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.512256 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.512337 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.513038 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.513967 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.514763 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.515640 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.517354 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.517438 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.518156 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.519012 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.519935 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.520645 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.522441 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.522495 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.523269 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.524100 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.525002 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.525802 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.526789 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.529329 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.529418 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.529450 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.530205 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.531130 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.531976 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.532833 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.533695 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.535483 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.535579 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.536393 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.537256 kernel: Failed to create system directory sunrpc Feb 9 09:14:52.385000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.547401 kernel: RPC: Registered named UNIX socket transport module. Feb 9 09:14:52.547610 kernel: RPC: Registered udp transport module. Feb 9 09:14:52.547640 kernel: RPC: Registered tcp transport module. Feb 9 09:14:52.548311 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 09:14:52.385000 audit[3314]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5627d8d75ad0 a1=1588c4 a2=5627d6bb32b0 a3=5 items=6 ppid=50 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.385000 audit: CWD cwd="/" Feb 9 09:14:52.385000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PATH item=1 name=(null) inode=25383 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PATH item=2 name=(null) inode=25383 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PATH item=3 name=(null) inode=25384 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PATH item=4 name=(null) inode=25383 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PATH item=5 name=(null) inode=25385 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:14:52.385000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.598825 kernel: Failed to create system directory nfs Feb 9 09:14:52.598954 kernel: Failed to create system directory nfs Feb 9 09:14:52.599007 kernel: Failed to create system directory nfs Feb 9 09:14:52.599032 kernel: Failed to create system directory nfs Feb 9 09:14:52.599050 kernel: Failed to create system directory nfs Feb 9 09:14:52.599067 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.600364 kernel: Failed to create system directory nfs Feb 9 09:14:52.600480 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.601290 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.602203 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.603870 kernel: Failed to create system directory nfs Feb 9 09:14:52.603916 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.605041 kubelet[1435]: E0209 09:14:52.604977 1435 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:52.605668 kernel: Failed to create system directory nfs Feb 9 09:14:52.605716 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.607315 kernel: Failed to create system directory nfs Feb 9 09:14:52.607490 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.608163 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.608979 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.609779 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.611367 kernel: Failed to create system directory nfs Feb 9 09:14:52.611458 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.612244 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.613093 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.613869 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.616419 kernel: Failed to create system directory nfs Feb 9 09:14:52.616510 kernel: Failed to create system directory nfs Feb 9 09:14:52.616571 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.617211 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.618061 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.618801 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.619639 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.621279 kernel: Failed to create system directory nfs Feb 9 09:14:52.621330 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.622346 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.623174 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.624042 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.624838 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.625708 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.627313 kernel: Failed to create system directory nfs Feb 9 09:14:52.627406 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.628133 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.628880 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.629667 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.631292 kernel: Failed to create system directory nfs Feb 9 09:14:52.631380 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.632144 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.632920 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.633702 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.635356 kernel: Failed to create system directory nfs Feb 9 09:14:52.635468 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.636113 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.636966 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.637751 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.638626 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.640254 kernel: Failed to create system directory nfs Feb 9 09:14:52.640302 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.640990 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.642690 kernel: Failed to create system directory nfs Feb 9 09:14:52.642789 kernel: Failed to create system directory nfs Feb 9 09:14:52.581000 audit[3314]: AVC avc: denied { confidentiality } for pid=3314 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.659012 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 09:14:52.581000 audit[3314]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5627d8f18680 a1=e29dc a2=5627d6bb32b0 a3=5 items=0 ppid=50 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.581000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 09:14:52.669011 kubelet[1435]: E0209 09:14:52.668926 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.716122 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.716222 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.716248 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.718037 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.718121 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.718922 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.719653 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.726356 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726619 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726657 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726686 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726741 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726769 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726805 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.726831 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.728413 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.728563 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.729222 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.730013 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.730957 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.731704 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.733473 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.733661 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.734307 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.735176 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.736096 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.737123 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.738039 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.738892 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.739839 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.742315 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.742418 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.742471 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.743285 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.744129 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.745089 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.745878 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.756041 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.756204 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.756909 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.757707 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.758648 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.760456 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.760607 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.762270 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.762378 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.764222 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.764299 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.765074 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.766002 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.766837 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.767670 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.769413 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.769462 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.770240 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.771030 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.771871 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.772699 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.774338 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.774423 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.775130 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.776909 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.776954 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.777815 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.778734 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.780388 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.780480 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.781200 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.782105 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.783040 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.783890 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.786418 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.786471 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.786521 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.787162 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.788172 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.789062 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.790866 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.790942 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.791668 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.793369 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.793462 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.794171 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.795073 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.795905 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.796690 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.798344 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.798448 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.799123 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.799925 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.800660 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.802326 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.802464 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.808478 kernel: Failed to create system directory nfs4 Feb 9 09:14:52.691000 audit[3319]: AVC avc: denied { confidentiality } for pid=3319 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.947143 kernel: NFS: Registering the id_resolver key type Feb 9 09:14:52.947350 kernel: Key type id_resolver registered Feb 9 09:14:52.947387 kernel: Key type id_legacy registered Feb 9 09:14:52.691000 audit[3319]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1c8d871010 a1=1d3cc4 a2=557d0535f2b0 a3=5 items=0 ppid=50 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.691000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.972266 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.972364 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.973360 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.974364 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.975343 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.976314 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.977277 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.978229 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.979169 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.980277 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.981262 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.982279 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.983294 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.984322 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.985509 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.988102 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.988164 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.989192 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.990206 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.991325 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.992296 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.993315 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.994284 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.995282 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.996243 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.997303 kernel: Failed to create system directory rpcgss Feb 9 09:14:52.963000 audit[3321]: AVC avc: denied { confidentiality } for pid=3321 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 09:14:52.963000 audit[3321]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc0cd353010 a1=4f524 a2=5584d7d9c2b0 a3=5 items=0 ppid=50 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:52.963000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 09:14:53.669318 kubelet[1435]: E0209 09:14:53.669279 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:53.672000 audit[3353]: NETFILTER_CFG table=filter:99 family=2 entries=8 op=nft_register_rule pid=3353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:53.672000 audit[3353]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffbf967aa0 a2=0 a3=7fffbf967a8c items=0 ppid=1747 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:53.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:53.677000 audit[3353]: NETFILTER_CFG table=nat:100 family=2 entries=198 op=nft_register_rule pid=3353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:14:53.677000 audit[3353]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffbf967aa0 a2=0 a3=7fffbf967a8c items=0 ppid=1747 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:14:53.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:14:54.670570 kubelet[1435]: E0209 09:14:54.670402 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:55.670751 kubelet[1435]: E0209 09:14:55.670678 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:56.671940 kubelet[1435]: E0209 09:14:56.671857 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:57.673182 kubelet[1435]: E0209 09:14:57.673101 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:58.673811 kubelet[1435]: E0209 09:14:58.673723 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:14:59.165296 nfsidmap[3327]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-9-0cc2ab7272' Feb 9 09:14:59.675009 kubelet[1435]: E0209 09:14:59.674928 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:00.676168 kubelet[1435]: E0209 09:15:00.676022 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:01.677502 kubelet[1435]: E0209 09:15:01.677424 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:02.678678 kubelet[1435]: E0209 09:15:02.678506 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:03.680125 kubelet[1435]: E0209 09:15:03.680032 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:04.681286 kubelet[1435]: E0209 09:15:04.681197 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:05.304577 nfsidmap[3363]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-9-0cc2ab7272' Feb 9 09:15:05.327180 kernel: kauditd_printk_skb: 404 callbacks suppressed Feb 9 09:15:05.327336 kernel: audit: type=1400 audit(1707470105.324:914): avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.324000 audit[1180]: AVC avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.324000 audit[1180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556bdd2b95f0 a2=10 a3=25f9ab759d49a636 items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.338675 kernel: audit: type=1300 audit(1707470105.324:914): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556bdd2b95f0 a2=10 a3=25f9ab759d49a636 items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.338949 kernel: audit: type=1327 audit(1707470105.324:914): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:15:05.324000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:15:05.324000 audit[1180]: AVC avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.346409 kernel: audit: type=1400 audit(1707470105.324:915): avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.346638 kernel: audit: type=1300 audit(1707470105.324:915): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556bdd2b95f0 a2=10 a3=25f9ab759d49a636 items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.324000 audit[1180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=556bdd2b95f0 a2=10 a3=25f9ab759d49a636 items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.324000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:15:05.355940 kernel: audit: type=1327 audit(1707470105.324:915): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 09:15:05.356214 kernel: audit: type=1400 audit(1707470105.326:916): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.326000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.360883 kernel: audit: type=1400 audit(1707470105.326:917): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.326000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.326000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.371191 kernel: audit: type=1400 audit(1707470105.326:918): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 09:15:05.520835 env[1105]: time="2024-02-09T09:15:05.520175920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84b5a757-f968-4bbc-a18d-7f2dc0e297b9,Namespace:default,Attempt:0,}" Feb 9 09:15:05.682628 kubelet[1435]: E0209 09:15:05.682345 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:05.783234 systemd-networkd[1000]: cali5ec59c6bf6e: Link UP Feb 9 09:15:05.787983 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:15:05.788173 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 09:15:05.788157 systemd-networkd[1000]: cali5ec59c6bf6e: Gained carrier Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.621 [INFO][3372] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {24.144.85.89-k8s-test--pod--1-eth0 default 84b5a757-f968-4bbc-a18d-7f2dc0e297b9 1226 0 2024-02-09 09:14:35 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 24.144.85.89 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.622 [INFO][3372] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.671 [INFO][3386] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" HandleID="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Workload="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.703 [INFO][3386] ipam_plugin.go 268: Auto assigning IP ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" HandleID="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Workload="24.144.85.89-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000527fa0), Attrs:map[string]string{"namespace":"default", "node":"24.144.85.89", "pod":"test-pod-1", "timestamp":"2024-02-09 09:15:05.671549163 +0000 UTC"}, Hostname:"24.144.85.89", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.704 [INFO][3386] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.704 [INFO][3386] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.704 [INFO][3386] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '24.144.85.89' Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.709 [INFO][3386] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.721 [INFO][3386] ipam.go 372: Looking up existing affinities for host host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.732 [INFO][3386] ipam.go 489: Trying affinity for 192.168.105.128/26 host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.737 [INFO][3386] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.745 [INFO][3386] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.745 [INFO][3386] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.750 [INFO][3386] ipam.go 1682: Creating new handle: k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760 Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.760 [INFO][3386] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.774 [INFO][3386] ipam.go 1216: Successfully claimed IPs: [192.168.105.133/26] block=192.168.105.128/26 handle="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.774 [INFO][3386] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.133/26] handle="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" host="24.144.85.89" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.775 [INFO][3386] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.775 [INFO][3386] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.133/26] IPv6=[] ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" HandleID="k8s-pod-network.39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Workload="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.777 [INFO][3372] k8s.go 385: Populated endpoint ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84b5a757-f968-4bbc-a18d-7f2dc0e297b9", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:15:05.806334 env[1105]: 2024-02-09 09:15:05.777 [INFO][3372] k8s.go 386: Calico CNI using IPs: [192.168.105.133/32] ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.810051 env[1105]: 2024-02-09 09:15:05.777 [INFO][3372] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.810051 env[1105]: 2024-02-09 09:15:05.789 [INFO][3372] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.810051 env[1105]: 2024-02-09 09:15:05.790 [INFO][3372] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"24.144.85.89-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"84b5a757-f968-4bbc-a18d-7f2dc0e297b9", ResourceVersion:"1226", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 14, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"24.144.85.89", ContainerID:"39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"fe:99:a5:5a:eb:16", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:15:05.810051 env[1105]: 2024-02-09 09:15:05.802 [INFO][3372] k8s.go 491: Wrote updated endpoint to datastore ContainerID="39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="24.144.85.89-k8s-test--pod--1-eth0" Feb 9 09:15:05.833145 env[1105]: time="2024-02-09T09:15:05.833022178Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:15:05.833145 env[1105]: time="2024-02-09T09:15:05.833139624Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:15:05.833424 env[1105]: time="2024-02-09T09:15:05.833164035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:15:05.833424 env[1105]: time="2024-02-09T09:15:05.833332118Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760 pid=3413 runtime=io.containerd.runc.v2 Feb 9 09:15:05.858000 audit[3425]: NETFILTER_CFG table=filter:101 family=2 entries=48 op=nft_register_chain pid=3425 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:15:05.858000 audit[3425]: SYSCALL arch=c000003e syscall=46 success=yes exit=23120 a0=3 a1=7ffeec815e80 a2=0 a3=7ffeec815e6c items=0 ppid=2209 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.862794 kernel: audit: type=1325 audit(1707470105.858:919): table=filter:101 family=2 entries=48 op=nft_register_chain pid=3425 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:15:05.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:15:05.874629 systemd[1]: Started cri-containerd-39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760.scope. Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.906000 audit: BPF prog-id=122 op=LOAD Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613435363933373363393565376131383635663532616636363963 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613435363933373363393565376131383635663532616636363963 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.908000 audit: BPF prog-id=123 op=LOAD Feb 9 09:15:05.908000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b6eb0 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613435363933373363393565376131383635663532616636363963 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.910000 audit: BPF prog-id=124 op=LOAD Feb 9 09:15:05.910000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b6ef8 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613435363933373363393565376131383635663532616636363963 Feb 9 09:15:05.911000 audit: BPF prog-id=124 op=UNLOAD Feb 9 09:15:05.911000 audit: BPF prog-id=123 op=UNLOAD Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:05.911000 audit: BPF prog-id=125 op=LOAD Feb 9 09:15:05.911000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001b7308 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:05.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339613435363933373363393565376131383635663532616636363963 Feb 9 09:15:05.954442 env[1105]: time="2024-02-09T09:15:05.954286369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:84b5a757-f968-4bbc-a18d-7f2dc0e297b9,Namespace:default,Attempt:0,} returns sandbox id \"39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760\"" Feb 9 09:15:05.961052 env[1105]: time="2024-02-09T09:15:05.960996123Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 09:15:06.513507 env[1105]: time="2024-02-09T09:15:06.513414083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:15:06.515818 env[1105]: time="2024-02-09T09:15:06.515661905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:15:06.517769 env[1105]: time="2024-02-09T09:15:06.517707543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:15:06.520627 env[1105]: time="2024-02-09T09:15:06.520579491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:15:06.521595 env[1105]: time="2024-02-09T09:15:06.521495168Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 09:15:06.526195 env[1105]: time="2024-02-09T09:15:06.526087190Z" level=info msg="CreateContainer within sandbox \"39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 09:15:06.544327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3434470572.mount: Deactivated successfully. Feb 9 09:15:06.562259 env[1105]: time="2024-02-09T09:15:06.562171662Z" level=info msg="CreateContainer within sandbox \"39a4569373c95e7a1865f52af669c4170d40c7d6f07b80026d230924e1def760\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d9c1612cd661d359141157861dfd22bfd1e61d9f0a2ec9c7a2e627303164d7f8\"" Feb 9 09:15:06.564093 env[1105]: time="2024-02-09T09:15:06.564018569Z" level=info msg="StartContainer for \"d9c1612cd661d359141157861dfd22bfd1e61d9f0a2ec9c7a2e627303164d7f8\"" Feb 9 09:15:06.595169 systemd[1]: Started cri-containerd-d9c1612cd661d359141157861dfd22bfd1e61d9f0a2ec9c7a2e627303164d7f8.scope. Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.617000 audit: BPF prog-id=126 op=LOAD Feb 9 09:15:06.618000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.618000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3413 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:06.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439633136313263643636316433353931343131353738363164666432 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3413 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:06.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439633136313263643636316433353931343131353738363164666432 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.619000 audit: BPF prog-id=127 op=LOAD Feb 9 09:15:06.619000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0360 items=0 ppid=3413 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:06.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439633136313263643636316433353931343131353738363164666432 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.620000 audit: BPF prog-id=128 op=LOAD Feb 9 09:15:06.620000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a03a8 items=0 ppid=3413 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:06.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439633136313263643636316433353931343131353738363164666432 Feb 9 09:15:06.621000 audit: BPF prog-id=128 op=UNLOAD Feb 9 09:15:06.621000 audit: BPF prog-id=127 op=UNLOAD Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:15:06.621000 audit: BPF prog-id=129 op=LOAD Feb 9 09:15:06.621000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a07b8 items=0 ppid=3413 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:15:06.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439633136313263643636316433353931343131353738363164666432 Feb 9 09:15:06.681486 env[1105]: time="2024-02-09T09:15:06.681402191Z" level=info msg="StartContainer for \"d9c1612cd661d359141157861dfd22bfd1e61d9f0a2ec9c7a2e627303164d7f8\" returns successfully" Feb 9 09:15:06.682579 kubelet[1435]: E0209 09:15:06.682506 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:07.607045 systemd-networkd[1000]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 09:15:07.683249 kubelet[1435]: E0209 09:15:07.683166 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:08.684324 kubelet[1435]: E0209 09:15:08.684240 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:15:09.685013 kubelet[1435]: E0209 09:15:09.684946 1435 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"