Feb 12 19:40:52.181765 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 12 19:40:52.181819 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:40:52.181855 kernel: BIOS-provided physical RAM map: Feb 12 19:40:52.181866 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 19:40:52.181878 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 19:40:52.181890 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 19:40:52.181905 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 12 19:40:52.181917 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 12 19:40:52.181933 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 19:40:52.181946 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 19:40:52.181957 kernel: NX (Execute Disable) protection: active Feb 12 19:40:52.181968 kernel: SMBIOS 2.8 present. Feb 12 19:40:52.181980 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 12 19:40:52.181993 kernel: Hypervisor detected: KVM Feb 12 19:40:52.182009 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:40:52.182026 kernel: kvm-clock: cpu 0, msr 26faa001, primary cpu clock Feb 12 19:40:52.182047 kernel: kvm-clock: using sched offset of 5942694786 cycles Feb 12 19:40:52.182062 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:40:52.182081 kernel: tsc: Detected 2494.138 MHz processor Feb 12 19:40:52.182094 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:40:52.182109 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:40:52.182122 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 12 19:40:52.182136 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:40:52.182154 kernel: ACPI: Early table checksum verification disabled Feb 12 19:40:52.182176 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 12 19:40:52.182190 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182204 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182218 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182232 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 19:40:52.182246 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182260 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182310 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182349 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:40:52.182369 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 12 19:40:52.182382 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 12 19:40:52.182403 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 19:40:52.182417 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 12 19:40:52.182431 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 12 19:40:52.182445 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 12 19:40:52.182464 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 12 19:40:52.182493 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:40:52.182507 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:40:52.182522 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 19:40:52.182537 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 19:40:52.182563 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 12 19:40:52.182578 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 12 19:40:52.182609 kernel: Zone ranges: Feb 12 19:40:52.182638 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:40:52.182653 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 12 19:40:52.182674 kernel: Normal empty Feb 12 19:40:52.182690 kernel: Movable zone start for each node Feb 12 19:40:52.182705 kernel: Early memory node ranges Feb 12 19:40:52.182720 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 19:40:52.182742 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 12 19:40:52.182755 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 12 19:40:52.182773 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:40:52.182796 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 19:40:52.182811 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 12 19:40:52.182826 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 19:40:52.182859 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:40:52.182883 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:40:52.182898 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:40:52.182913 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:40:52.182928 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:40:52.182954 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:40:52.182968 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:40:52.182981 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:40:52.182996 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:40:52.183010 kernel: TSC deadline timer available Feb 12 19:40:52.183029 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:40:52.183048 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 19:40:52.183063 kernel: Booting paravirtualized kernel on KVM Feb 12 19:40:52.183079 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:40:52.183104 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:40:52.183119 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:40:52.183134 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:40:52.183149 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:40:52.183164 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 19:40:52.183191 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 19:40:52.183207 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 12 19:40:52.183221 kernel: Policy zone: DMA32 Feb 12 19:40:52.183246 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:40:52.183266 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:40:52.183281 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:40:52.183302 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:40:52.183335 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:40:52.183350 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 19:40:52.183366 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:40:52.183388 kernel: Kernel/User page tables isolation: enabled Feb 12 19:40:52.183403 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:40:52.183421 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:40:52.183443 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:40:52.183458 kernel: rcu: RCU event tracing is enabled. Feb 12 19:40:52.183474 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:40:52.183489 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:40:52.183504 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:40:52.183533 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:40:52.183548 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:40:52.183563 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 19:40:52.183583 kernel: random: crng init done Feb 12 19:40:52.183598 kernel: Console: colour VGA+ 80x25 Feb 12 19:40:52.183613 kernel: printk: console [tty0] enabled Feb 12 19:40:52.183628 kernel: printk: console [ttyS0] enabled Feb 12 19:40:52.183643 kernel: ACPI: Core revision 20210730 Feb 12 19:40:52.183657 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:40:52.183669 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:40:52.183683 kernel: x2apic enabled Feb 12 19:40:52.183697 kernel: Switched APIC routing to physical x2apic. Feb 12 19:40:52.183713 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:40:52.183726 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:40:52.183741 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494138) Feb 12 19:40:52.183756 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 19:40:52.183768 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 19:40:52.183783 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:40:52.183798 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:40:52.183813 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:40:52.183829 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:40:52.183847 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 12 19:40:52.183874 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:40:52.183890 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:40:52.183909 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 19:40:52.183925 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:40:52.183941 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:40:52.183956 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:40:52.183981 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:40:52.183996 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:40:52.184018 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:40:52.184037 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:40:52.184063 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:40:52.184088 kernel: LSM: Security Framework initializing Feb 12 19:40:52.184103 kernel: SELinux: Initializing. Feb 12 19:40:52.184119 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:40:52.184135 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:40:52.184151 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 12 19:40:52.184170 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 19:40:52.184186 kernel: signal: max sigframe size: 1776 Feb 12 19:40:52.184202 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:40:52.184218 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:40:52.184234 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:40:52.184249 kernel: x86: Booting SMP configuration: Feb 12 19:40:52.184266 kernel: .... node #0, CPUs: #1 Feb 12 19:40:52.184281 kernel: kvm-clock: cpu 1, msr 26faa041, secondary cpu clock Feb 12 19:40:52.184297 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 19:40:52.184317 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:40:52.184349 kernel: smpboot: Max logical packages: 1 Feb 12 19:40:52.184365 kernel: smpboot: Total of 2 processors activated (9976.55 BogoMIPS) Feb 12 19:40:52.184381 kernel: devtmpfs: initialized Feb 12 19:40:52.184396 kernel: x86/mm: Memory block size: 128MB Feb 12 19:40:52.184412 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:40:52.184428 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:40:52.184444 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:40:52.184486 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:40:52.184515 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:40:52.184532 kernel: audit: type=2000 audit(1707766851.323:1): state=initialized audit_enabled=0 res=1 Feb 12 19:40:52.184547 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:40:52.184562 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:40:52.184578 kernel: cpuidle: using governor menu Feb 12 19:40:52.184593 kernel: ACPI: bus type PCI registered Feb 12 19:40:52.184609 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:40:52.184625 kernel: dca service started, version 1.12.1 Feb 12 19:40:52.184712 kernel: PCI: Using configuration type 1 for base access Feb 12 19:40:52.184733 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:40:52.184768 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:40:52.184784 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:40:52.184800 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:40:52.184824 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:40:52.184840 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:40:52.184855 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:40:52.184868 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:40:52.184883 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:40:52.184899 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:40:52.184918 kernel: ACPI: Interpreter enabled Feb 12 19:40:52.184941 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:40:52.184956 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:40:52.184972 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:40:52.184987 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:40:52.185003 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:40:52.185303 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:40:52.185550 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 19:40:52.185579 kernel: acpiphp: Slot [3] registered Feb 12 19:40:52.185596 kernel: acpiphp: Slot [4] registered Feb 12 19:40:52.185611 kernel: acpiphp: Slot [5] registered Feb 12 19:40:52.185626 kernel: acpiphp: Slot [6] registered Feb 12 19:40:52.185642 kernel: acpiphp: Slot [7] registered Feb 12 19:40:52.185656 kernel: acpiphp: Slot [8] registered Feb 12 19:40:52.185669 kernel: acpiphp: Slot [9] registered Feb 12 19:40:52.185682 kernel: acpiphp: Slot [10] registered Feb 12 19:40:52.185700 kernel: acpiphp: Slot [11] registered Feb 12 19:40:52.185711 kernel: acpiphp: Slot [12] registered Feb 12 19:40:52.185724 kernel: acpiphp: Slot [13] registered Feb 12 19:40:52.185735 kernel: acpiphp: Slot [14] registered Feb 12 19:40:52.185747 kernel: acpiphp: Slot [15] registered Feb 12 19:40:52.185760 kernel: acpiphp: Slot [16] registered Feb 12 19:40:52.185773 kernel: acpiphp: Slot [17] registered Feb 12 19:40:52.185785 kernel: acpiphp: Slot [18] registered Feb 12 19:40:52.185797 kernel: acpiphp: Slot [19] registered Feb 12 19:40:52.185809 kernel: acpiphp: Slot [20] registered Feb 12 19:40:52.185826 kernel: acpiphp: Slot [21] registered Feb 12 19:40:52.185839 kernel: acpiphp: Slot [22] registered Feb 12 19:40:52.185851 kernel: acpiphp: Slot [23] registered Feb 12 19:40:52.185863 kernel: acpiphp: Slot [24] registered Feb 12 19:40:52.185876 kernel: acpiphp: Slot [25] registered Feb 12 19:40:52.185889 kernel: acpiphp: Slot [26] registered Feb 12 19:40:52.185900 kernel: acpiphp: Slot [27] registered Feb 12 19:40:52.185913 kernel: acpiphp: Slot [28] registered Feb 12 19:40:52.185926 kernel: acpiphp: Slot [29] registered Feb 12 19:40:52.185943 kernel: acpiphp: Slot [30] registered Feb 12 19:40:52.185956 kernel: acpiphp: Slot [31] registered Feb 12 19:40:52.185969 kernel: PCI host bridge to bus 0000:00 Feb 12 19:40:52.186229 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:40:52.186464 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:40:52.186598 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:40:52.186723 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 19:40:52.186844 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 19:40:52.186974 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:40:52.187178 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:40:52.187427 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:40:52.187661 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:40:52.187964 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 12 19:40:52.188145 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:40:52.188300 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:40:52.188472 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:40:52.188615 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:40:52.188771 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 12 19:40:52.188920 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 12 19:40:52.189105 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:40:52.189260 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 19:40:52.189597 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 19:40:52.189771 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 19:40:52.189941 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 19:40:52.190193 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 19:40:52.190433 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 12 19:40:52.190579 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 19:40:52.190724 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:40:52.190874 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:40:52.191024 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 12 19:40:52.191172 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 12 19:40:52.191318 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 19:40:52.191529 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:40:52.191679 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 12 19:40:52.191830 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 12 19:40:52.191968 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 19:40:52.192149 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 12 19:40:52.192294 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 12 19:40:52.192564 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 12 19:40:52.192739 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 19:40:52.192892 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:40:52.193062 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:40:52.193202 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 12 19:40:52.193367 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 19:40:52.193519 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:40:52.193756 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 12 19:40:52.193948 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 12 19:40:52.194097 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 12 19:40:52.194316 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 19:40:52.194497 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 12 19:40:52.194644 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 12 19:40:52.194666 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:40:52.194682 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:40:52.194699 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:40:52.194720 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:40:52.194735 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:40:52.194751 kernel: iommu: Default domain type: Translated Feb 12 19:40:52.194767 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:40:52.195202 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:40:52.195539 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:40:52.195714 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:40:52.195737 kernel: vgaarb: loaded Feb 12 19:40:52.195753 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:40:52.195775 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:40:52.195791 kernel: PTP clock support registered Feb 12 19:40:52.195807 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:40:52.195822 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:40:52.195838 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 19:40:52.195854 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 12 19:40:52.195868 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:40:52.195976 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:40:52.195992 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:40:52.196012 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:40:52.196026 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:40:52.196037 kernel: pnp: PnP ACPI init Feb 12 19:40:52.196049 kernel: pnp: PnP ACPI: found 4 devices Feb 12 19:40:52.196065 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:40:52.196080 kernel: NET: Registered PF_INET protocol family Feb 12 19:40:52.196095 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:40:52.196123 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 19:40:52.196140 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:40:52.196159 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:40:52.196174 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 19:40:52.196190 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 19:40:52.196205 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:40:52.196220 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:40:52.196234 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:40:52.196249 kernel: NET: Registered PF_XDP protocol family Feb 12 19:40:52.196416 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:40:52.196591 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:40:52.196745 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:40:52.196897 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 19:40:52.207558 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 19:40:52.207772 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:40:52.207935 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:40:52.208084 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:40:52.208142 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 19:40:52.208373 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 51517 usecs Feb 12 19:40:52.208402 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:40:52.208418 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:40:52.208439 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:40:52.208455 kernel: Initialise system trusted keyrings Feb 12 19:40:52.208471 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 19:40:52.208487 kernel: Key type asymmetric registered Feb 12 19:40:52.208512 kernel: Asymmetric key parser 'x509' registered Feb 12 19:40:52.208529 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:40:52.208551 kernel: io scheduler mq-deadline registered Feb 12 19:40:52.208565 kernel: io scheduler kyber registered Feb 12 19:40:52.208581 kernel: io scheduler bfq registered Feb 12 19:40:52.208597 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:40:52.208613 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 19:40:52.208666 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:40:52.208682 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:40:52.208698 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:40:52.208713 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:40:52.208732 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:40:52.208744 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:40:52.208756 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:40:52.208969 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 12 19:40:52.209105 kernel: rtc_cmos 00:03: registered as rtc0 Feb 12 19:40:52.209282 kernel: rtc_cmos 00:03: setting system clock to 2024-02-12T19:40:51 UTC (1707766851) Feb 12 19:40:52.209501 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 12 19:40:52.209531 kernel: intel_pstate: CPU model not supported Feb 12 19:40:52.209556 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:40:52.209571 kernel: Segment Routing with IPv6 Feb 12 19:40:52.209585 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:40:52.209601 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:40:52.209617 kernel: Key type dns_resolver registered Feb 12 19:40:52.209633 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:40:52.209648 kernel: IPI shorthand broadcast: enabled Feb 12 19:40:52.209661 kernel: sched_clock: Marking stable (872791315, 119183032)->(1203488867, -211514520) Feb 12 19:40:52.209674 kernel: registered taskstats version 1 Feb 12 19:40:52.209691 kernel: Loading compiled-in X.509 certificates Feb 12 19:40:52.209705 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 12 19:40:52.209719 kernel: Key type .fscrypt registered Feb 12 19:40:52.209733 kernel: Key type fscrypt-provisioning registered Feb 12 19:40:52.209750 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:40:52.209765 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:40:52.209781 kernel: ima: No architecture policies found Feb 12 19:40:52.209796 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:40:52.209811 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:40:52.209837 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:40:52.209853 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:40:52.209867 kernel: Run /init as init process Feb 12 19:40:52.209881 kernel: with arguments: Feb 12 19:40:52.209898 kernel: /init Feb 12 19:40:52.209938 kernel: with environment: Feb 12 19:40:52.209955 kernel: HOME=/ Feb 12 19:40:52.209968 kernel: TERM=linux Feb 12 19:40:52.209983 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:40:52.210008 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:40:52.210034 systemd[1]: Detected virtualization kvm. Feb 12 19:40:52.210052 systemd[1]: Detected architecture x86-64. Feb 12 19:40:52.210068 systemd[1]: Running in initrd. Feb 12 19:40:52.210085 systemd[1]: No hostname configured, using default hostname. Feb 12 19:40:52.210102 systemd[1]: Hostname set to . Feb 12 19:40:52.210119 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:40:52.210139 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:40:52.210197 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:40:52.210214 systemd[1]: Reached target cryptsetup.target. Feb 12 19:40:52.210231 systemd[1]: Reached target paths.target. Feb 12 19:40:52.210248 systemd[1]: Reached target slices.target. Feb 12 19:40:52.210265 systemd[1]: Reached target swap.target. Feb 12 19:40:52.210282 systemd[1]: Reached target timers.target. Feb 12 19:40:52.210300 systemd[1]: Listening on iscsid.socket. Feb 12 19:40:52.210349 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:40:52.210367 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:40:52.210384 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:40:52.210401 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:40:52.210419 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:40:52.210436 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:40:52.210453 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:40:52.210477 systemd[1]: Reached target sockets.target. Feb 12 19:40:52.210498 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:40:52.210517 systemd[1]: Finished network-cleanup.service. Feb 12 19:40:52.210537 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:40:52.210554 systemd[1]: Starting systemd-journald.service... Feb 12 19:40:52.210572 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:40:52.210588 systemd[1]: Starting systemd-resolved.service... Feb 12 19:40:52.210614 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:40:52.210631 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:40:52.210649 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:40:52.210674 systemd-journald[184]: Journal started Feb 12 19:40:52.210778 systemd-journald[184]: Runtime Journal (/run/log/journal/70ca55c066f9489fb0947b2e1682752f) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:40:52.198583 systemd-modules-load[185]: Inserted module 'overlay' Feb 12 19:40:52.249494 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:40:52.249548 kernel: Bridge firewalling registered Feb 12 19:40:52.249568 kernel: audit: type=1130 audit(1707766852.244:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.249585 systemd[1]: Started systemd-journald.service. Feb 12 19:40:52.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.207158 systemd-resolved[186]: Positive Trust Anchors: Feb 12 19:40:52.207172 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:40:52.207233 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:40:52.216056 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 12 19:40:52.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.243028 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 12 19:40:52.262947 kernel: audit: type=1130 audit(1707766852.255:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.256272 systemd[1]: Started systemd-resolved.service. Feb 12 19:40:52.260468 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:40:52.261145 systemd[1]: Reached target nss-lookup.target. Feb 12 19:40:52.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.267520 kernel: audit: type=1130 audit(1707766852.259:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.268350 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:40:52.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.274435 kernel: audit: type=1130 audit(1707766852.260:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.274550 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:40:52.281395 kernel: SCSI subsystem initialized Feb 12 19:40:52.289566 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:40:52.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.296401 kernel: audit: type=1130 audit(1707766852.290:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.296474 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:40:52.301396 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:40:52.301514 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:40:52.317160 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:40:52.325392 kernel: audit: type=1130 audit(1707766852.317:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.322510 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:40:52.328001 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 12 19:40:52.329181 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:40:52.334549 kernel: audit: type=1130 audit(1707766852.329:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.335044 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:40:52.357062 dracut-cmdline[202]: dracut-dracut-053 Feb 12 19:40:52.361511 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:40:52.367628 kernel: audit: type=1130 audit(1707766852.361:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.369218 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:40:52.519392 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:40:52.539380 kernel: iscsi: registered transport (tcp) Feb 12 19:40:52.570622 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:40:52.570737 kernel: QLogic iSCSI HBA Driver Feb 12 19:40:52.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.686464 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:40:52.692838 kernel: audit: type=1130 audit(1707766852.686:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.688841 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:40:52.780195 kernel: raid6: avx2x4 gen() 13417 MB/s Feb 12 19:40:52.808373 kernel: raid6: avx2x4 xor() 4928 MB/s Feb 12 19:40:52.821392 kernel: raid6: avx2x2 gen() 11581 MB/s Feb 12 19:40:52.838410 kernel: raid6: avx2x2 xor() 13229 MB/s Feb 12 19:40:52.857093 kernel: raid6: avx2x1 gen() 9042 MB/s Feb 12 19:40:52.873418 kernel: raid6: avx2x1 xor() 8086 MB/s Feb 12 19:40:52.890417 kernel: raid6: sse2x4 gen() 7984 MB/s Feb 12 19:40:52.920331 kernel: raid6: sse2x4 xor() 4269 MB/s Feb 12 19:40:52.932460 kernel: raid6: sse2x2 gen() 7577 MB/s Feb 12 19:40:52.950420 kernel: raid6: sse2x2 xor() 5352 MB/s Feb 12 19:40:52.968445 kernel: raid6: sse2x1 gen() 6908 MB/s Feb 12 19:40:52.986387 kernel: raid6: sse2x1 xor() 4370 MB/s Feb 12 19:40:52.986480 kernel: raid6: using algorithm avx2x4 gen() 13417 MB/s Feb 12 19:40:52.986499 kernel: raid6: .... xor() 4928 MB/s, rmw enabled Feb 12 19:40:52.987241 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:40:53.008377 kernel: xor: automatically using best checksumming function avx Feb 12 19:40:53.164388 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:40:53.181598 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:40:53.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.182000 audit: BPF prog-id=7 op=LOAD Feb 12 19:40:53.182000 audit: BPF prog-id=8 op=LOAD Feb 12 19:40:53.183840 systemd[1]: Starting systemd-udevd.service... Feb 12 19:40:53.206437 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:40:53.215949 systemd[1]: Started systemd-udevd.service. Feb 12 19:40:53.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.218111 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:40:53.241799 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation Feb 12 19:40:53.300212 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:40:53.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.302242 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:40:53.386230 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:40:53.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.470762 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 12 19:40:53.482359 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:40:53.487391 kernel: scsi host0: Virtio SCSI HBA Feb 12 19:40:53.513422 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:40:53.513496 kernel: GPT:9289727 != 125829119 Feb 12 19:40:53.513515 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:40:53.516674 kernel: GPT:9289727 != 125829119 Feb 12 19:40:53.516744 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:40:53.517931 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:40:53.561145 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:40:53.561234 kernel: AES CTR mode by8 optimization enabled Feb 12 19:40:53.566367 kernel: virtio_blk virtio5: [vdb] 948 512-byte logical blocks (485 kB/474 KiB) Feb 12 19:40:53.594361 kernel: ACPI: bus type USB registered Feb 12 19:40:53.595343 kernel: usbcore: registered new interface driver usbfs Feb 12 19:40:53.595388 kernel: usbcore: registered new interface driver hub Feb 12 19:40:53.595437 kernel: usbcore: registered new device driver usb Feb 12 19:40:53.628778 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (428) Feb 12 19:40:53.628140 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:40:53.722156 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 12 19:40:53.722189 kernel: ehci-pci: EHCI PCI platform driver Feb 12 19:40:53.722207 kernel: libata version 3.00 loaded. Feb 12 19:40:53.722226 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 12 19:40:53.722243 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:40:53.722547 kernel: scsi host1: ata_piix Feb 12 19:40:53.722733 kernel: scsi host2: ata_piix Feb 12 19:40:53.722964 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 12 19:40:53.722998 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 12 19:40:53.723022 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 12 19:40:53.723212 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 12 19:40:53.723417 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 12 19:40:53.723665 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 12 19:40:53.723842 kernel: hub 1-0:1.0: USB hub found Feb 12 19:40:53.724048 kernel: hub 1-0:1.0: 2 ports detected Feb 12 19:40:53.721415 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:40:53.733693 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:40:53.744623 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:40:53.751212 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:40:53.753500 systemd[1]: Starting disk-uuid.service... Feb 12 19:40:53.764540 disk-uuid[502]: Primary Header is updated. Feb 12 19:40:53.764540 disk-uuid[502]: Secondary Entries is updated. Feb 12 19:40:53.764540 disk-uuid[502]: Secondary Header is updated. Feb 12 19:40:53.772361 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:40:53.777670 kernel: GPT:disk_guids don't match. Feb 12 19:40:53.777742 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:40:53.777756 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:40:53.796401 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:40:54.787353 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:40:54.788970 disk-uuid[504]: The operation has completed successfully. Feb 12 19:40:54.848292 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:40:54.848484 systemd[1]: Finished disk-uuid.service. Feb 12 19:40:54.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:54.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:54.854518 systemd[1]: Starting verity-setup.service... Feb 12 19:40:54.889366 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:40:54.977103 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:40:54.981463 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:40:54.985886 systemd[1]: Finished verity-setup.service. Feb 12 19:40:54.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.114357 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:40:55.115248 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:40:55.116095 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:40:55.117457 systemd[1]: Starting ignition-setup.service... Feb 12 19:40:55.119944 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:40:55.145419 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:40:55.145523 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:40:55.145544 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:40:55.167789 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:40:55.180409 systemd[1]: Finished ignition-setup.service. Feb 12 19:40:55.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.183149 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:40:55.361279 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:40:55.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.363000 audit: BPF prog-id=9 op=LOAD Feb 12 19:40:55.366391 systemd[1]: Starting systemd-networkd.service... Feb 12 19:40:55.418606 ignition[607]: Ignition 2.14.0 Feb 12 19:40:55.420016 ignition[607]: Stage: fetch-offline Feb 12 19:40:55.420969 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:55.422154 ignition[607]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:55.429155 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:55.430664 ignition[607]: parsed url from cmdline: "" Feb 12 19:40:55.430852 ignition[607]: no config URL provided Feb 12 19:40:55.431646 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:40:55.432567 ignition[607]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:40:55.433279 ignition[607]: failed to fetch config: resource requires networking Feb 12 19:40:55.434799 ignition[607]: Ignition finished successfully Feb 12 19:40:55.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.437082 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:40:55.444527 systemd-networkd[687]: lo: Link UP Feb 12 19:40:55.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.444549 systemd-networkd[687]: lo: Gained carrier Feb 12 19:40:55.445584 systemd-networkd[687]: Enumeration completed Feb 12 19:40:55.446161 systemd-networkd[687]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:40:55.446625 systemd[1]: Started systemd-networkd.service. Feb 12 19:40:55.447748 systemd[1]: Reached target network.target. Feb 12 19:40:55.452234 systemd-networkd[687]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 12 19:40:55.453681 systemd[1]: Starting ignition-fetch.service... Feb 12 19:40:55.454210 systemd-networkd[687]: eth1: Link UP Feb 12 19:40:55.454218 systemd-networkd[687]: eth1: Gained carrier Feb 12 19:40:55.458586 systemd[1]: Starting iscsiuio.service... Feb 12 19:40:55.469049 systemd-networkd[687]: eth0: Link UP Feb 12 19:40:55.469060 systemd-networkd[687]: eth0: Gained carrier Feb 12 19:40:55.493114 ignition[690]: Ignition 2.14.0 Feb 12 19:40:55.493132 ignition[690]: Stage: fetch Feb 12 19:40:55.493420 ignition[690]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:55.493464 ignition[690]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:55.497856 ignition[690]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:55.498125 ignition[690]: parsed url from cmdline: "" Feb 12 19:40:55.498133 ignition[690]: no config URL provided Feb 12 19:40:55.498142 ignition[690]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:40:55.498157 ignition[690]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:40:55.498203 ignition[690]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 12 19:40:55.504483 systemd[1]: Started iscsiuio.service. Feb 12 19:40:55.506871 systemd[1]: Starting iscsid.service... Feb 12 19:40:55.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.507737 systemd-networkd[687]: eth0: DHCPv4 address 164.92.111.11/19, gateway 164.92.96.1 acquired from 169.254.169.253 Feb 12 19:40:55.515640 systemd-networkd[687]: eth1: DHCPv4 address 10.124.0.16/20 acquired from 169.254.169.253 Feb 12 19:40:55.518739 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:40:55.518739 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:40:55.518739 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:40:55.518739 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:40:55.518739 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:40:55.518739 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:40:55.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.520982 systemd[1]: Started iscsid.service. Feb 12 19:40:55.523921 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:40:55.546779 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:40:55.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.547687 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:40:55.548417 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:40:55.549486 systemd[1]: Reached target remote-fs.target. Feb 12 19:40:55.552045 ignition[690]: GET result: OK Feb 12 19:40:55.552666 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:40:55.552238 ignition[690]: parsing config with SHA512: 5309badf59d1ae9f2b5c2542cdfc614321c79d583518a1aeabf4091523f39633cc479141033dc76b0d3c66742b7ef11512ac04dfe2b316835d445af14dc5e8e6 Feb 12 19:40:55.572271 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:40:55.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.596568 unknown[690]: fetched base config from "system" Feb 12 19:40:55.597251 unknown[690]: fetched base config from "system" Feb 12 19:40:55.597931 unknown[690]: fetched user config from "digitalocean" Feb 12 19:40:55.599156 ignition[690]: fetch: fetch complete Feb 12 19:40:55.599763 ignition[690]: fetch: fetch passed Feb 12 19:40:55.600440 ignition[690]: Ignition finished successfully Feb 12 19:40:55.603022 systemd[1]: Finished ignition-fetch.service. Feb 12 19:40:55.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.605484 systemd[1]: Starting ignition-kargs.service... Feb 12 19:40:55.632398 ignition[713]: Ignition 2.14.0 Feb 12 19:40:55.632419 ignition[713]: Stage: kargs Feb 12 19:40:55.632688 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:55.632725 ignition[713]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:55.635574 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:55.637010 ignition[713]: kargs: kargs passed Feb 12 19:40:55.637117 ignition[713]: Ignition finished successfully Feb 12 19:40:55.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.638658 systemd[1]: Finished ignition-kargs.service. Feb 12 19:40:55.641910 systemd[1]: Starting ignition-disks.service... Feb 12 19:40:55.665295 ignition[718]: Ignition 2.14.0 Feb 12 19:40:55.665310 ignition[718]: Stage: disks Feb 12 19:40:55.665522 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:55.665556 ignition[718]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:55.668011 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:55.669559 ignition[718]: disks: disks passed Feb 12 19:40:55.669630 ignition[718]: Ignition finished successfully Feb 12 19:40:55.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.670977 systemd[1]: Finished ignition-disks.service. Feb 12 19:40:55.672202 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:40:55.673023 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:40:55.674010 systemd[1]: Reached target local-fs.target. Feb 12 19:40:55.674967 systemd[1]: Reached target sysinit.target. Feb 12 19:40:55.676063 systemd[1]: Reached target basic.target. Feb 12 19:40:55.678864 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:40:55.709924 systemd-fsck[726]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:40:55.714978 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:40:55.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.717433 systemd[1]: Mounting sysroot.mount... Feb 12 19:40:55.732377 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:40:55.733366 systemd[1]: Mounted sysroot.mount. Feb 12 19:40:55.734118 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:40:55.737235 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:40:55.742079 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 12 19:40:55.746681 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:40:55.748026 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:40:55.748787 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:40:55.752473 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:40:55.756433 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:40:55.773242 initrd-setup-root[738]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:40:55.787914 initrd-setup-root[746]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:40:55.805911 initrd-setup-root[754]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:40:55.822500 initrd-setup-root[764]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:40:55.925133 coreos-metadata[732]: Feb 12 19:40:55.925 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:40:55.949278 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:40:55.949378 kernel: audit: type=1130 audit(1707766855.942:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.941770 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:40:55.944015 systemd[1]: Starting ignition-mount.service... Feb 12 19:40:55.951532 coreos-metadata[732]: Feb 12 19:40:55.949 INFO Fetch successful Feb 12 19:40:55.953886 systemd[1]: Starting sysroot-boot.service... Feb 12 19:40:55.968454 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 12 19:40:55.970827 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 12 19:40:55.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.977507 kernel: audit: type=1130 audit(1707766855.972:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.981336 bash[783]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:40:55.982604 kernel: audit: type=1131 audit(1707766855.977:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:55.989812 coreos-metadata[733]: Feb 12 19:40:55.989 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:40:56.007539 ignition[784]: INFO : Ignition 2.14.0 Feb 12 19:40:56.007539 ignition[784]: INFO : Stage: mount Feb 12 19:40:56.008823 ignition[784]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:56.008823 ignition[784]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:56.015728 ignition[784]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:56.016642 coreos-metadata[733]: Feb 12 19:40:56.007 INFO Fetch successful Feb 12 19:40:56.011883 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:40:56.019788 coreos-metadata[733]: Feb 12 19:40:56.019 INFO wrote hostname ci-3510.3.2-f-c9b648f98a to /sysroot/etc/hostname Feb 12 19:40:56.021030 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:40:56.031942 ignition[784]: INFO : mount: mount passed Feb 12 19:40:56.031942 ignition[784]: INFO : Ignition finished successfully Feb 12 19:40:56.046405 kernel: audit: type=1130 audit(1707766856.031:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.046516 kernel: audit: type=1130 audit(1707766856.038:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.046541 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (792) Feb 12 19:40:56.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.032668 systemd[1]: Finished ignition-mount.service. Feb 12 19:40:56.054847 kernel: audit: type=1130 audit(1707766856.046:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.054896 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:40:56.054918 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:40:56.054938 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:40:56.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:56.043149 systemd[1]: Finished sysroot-boot.service. Feb 12 19:40:56.063936 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:40:56.065782 systemd[1]: Starting ignition-files.service... Feb 12 19:40:56.094998 ignition[813]: INFO : Ignition 2.14.0 Feb 12 19:40:56.094998 ignition[813]: INFO : Stage: files Feb 12 19:40:56.096725 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:56.096725 ignition[813]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:56.098784 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:56.100689 ignition[813]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:40:56.101624 ignition[813]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:40:56.101624 ignition[813]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:40:56.108104 ignition[813]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:40:56.109179 ignition[813]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:40:56.109989 ignition[813]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:40:56.109505 unknown[813]: wrote ssh authorized keys file for user: core Feb 12 19:40:56.114025 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:40:56.114025 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:40:56.633026 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:40:57.010222 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:40:57.010222 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:40:57.014074 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:40:57.014074 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:40:57.399932 systemd-networkd[687]: eth1: Gained IPv6LL Feb 12 19:40:57.400436 systemd-networkd[687]: eth0: Gained IPv6LL Feb 12 19:40:57.413505 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:40:57.577915 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:40:57.579816 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:40:57.579816 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:40:57.579816 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:40:57.651709 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:40:57.967217 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 19:40:57.968590 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:40:57.968590 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:40:57.968590 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:40:58.017307 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:40:58.881703 ignition[813]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:40:58.888231 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(b): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(b): op(c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(b): op(c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(b): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(d): [started] processing unit "prepare-critools.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(d): op(e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(d): op(e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(d): [finished] processing unit "prepare-critools.service" Feb 12 19:40:58.888231 ignition[813]: INFO : files: op(f): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:40:58.951031 kernel: audit: type=1130 audit(1707766858.905:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.951088 kernel: audit: type=1130 audit(1707766858.926:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.951110 kernel: audit: type=1131 audit(1707766858.927:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.902817 systemd[1]: Finished ignition-files.service. Feb 12 19:40:58.952095 ignition[813]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:40:58.952095 ignition[813]: INFO : files: op(10): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:40:58.952095 ignition[813]: INFO : files: op(10): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:40:58.952095 ignition[813]: INFO : files: op(11): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:40:58.952095 ignition[813]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:40:58.952095 ignition[813]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:40:58.952095 ignition[813]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:40:58.952095 ignition[813]: INFO : files: files passed Feb 12 19:40:58.952095 ignition[813]: INFO : Ignition finished successfully Feb 12 19:40:58.909169 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:40:58.915786 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:40:58.989477 kernel: audit: type=1130 audit(1707766858.962:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.989614 initrd-setup-root-after-ignition[838]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:40:58.917174 systemd[1]: Starting ignition-quench.service... Feb 12 19:40:58.925111 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:40:58.925302 systemd[1]: Finished ignition-quench.service. Feb 12 19:40:58.943884 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:40:58.963058 systemd[1]: Reached target ignition-complete.target. Feb 12 19:40:58.982591 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:40:59.010964 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:40:59.011174 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:40:59.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.012922 systemd[1]: Reached target initrd-fs.target. Feb 12 19:40:59.013498 systemd[1]: Reached target initrd.target. Feb 12 19:40:59.014675 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:40:59.016530 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:40:59.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.038570 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:40:59.040619 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:40:59.058822 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:40:59.059602 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:40:59.060761 systemd[1]: Stopped target timers.target. Feb 12 19:40:59.061781 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:40:59.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.062017 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:40:59.063100 systemd[1]: Stopped target initrd.target. Feb 12 19:40:59.064579 systemd[1]: Stopped target basic.target. Feb 12 19:40:59.065761 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:40:59.066457 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:40:59.067232 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:40:59.068100 systemd[1]: Stopped target remote-fs.target. Feb 12 19:40:59.068914 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:40:59.069802 systemd[1]: Stopped target sysinit.target. Feb 12 19:40:59.070571 systemd[1]: Stopped target local-fs.target. Feb 12 19:40:59.071377 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:40:59.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.072256 systemd[1]: Stopped target swap.target. Feb 12 19:40:59.073205 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:40:59.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.073473 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:40:59.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.074399 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:40:59.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.075154 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:40:59.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.075397 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:40:59.076286 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:40:59.076556 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:40:59.090298 iscsid[698]: iscsid shutting down. Feb 12 19:40:59.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.077541 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:40:59.077743 systemd[1]: Stopped ignition-files.service. Feb 12 19:40:59.078581 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:40:59.078787 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:40:59.081179 systemd[1]: Stopping ignition-mount.service... Feb 12 19:40:59.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.088235 systemd[1]: Stopping iscsid.service... Feb 12 19:40:59.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.090458 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:40:59.091113 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:40:59.091539 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:40:59.092536 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:40:59.092810 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:40:59.104940 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:40:59.105108 systemd[1]: Stopped iscsid.service. Feb 12 19:40:59.109594 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:40:59.109728 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:40:59.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.123117 systemd[1]: Stopping iscsiuio.service... Feb 12 19:40:59.127181 ignition[851]: INFO : Ignition 2.14.0 Feb 12 19:40:59.127181 ignition[851]: INFO : Stage: umount Feb 12 19:40:59.127181 ignition[851]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:59.127181 ignition[851]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:40:59.132814 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:40:59.133029 systemd[1]: Stopped iscsiuio.service. Feb 12 19:40:59.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.140048 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:40:59.139542 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:40:59.149403 ignition[851]: INFO : umount: umount passed Feb 12 19:40:59.149403 ignition[851]: INFO : Ignition finished successfully Feb 12 19:40:59.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.153626 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:40:59.153770 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:40:59.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.154805 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:40:59.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.154935 systemd[1]: Stopped ignition-mount.service. Feb 12 19:40:59.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.156242 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:40:59.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.156313 systemd[1]: Stopped ignition-disks.service. Feb 12 19:40:59.157031 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:40:59.157094 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:40:59.158122 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:40:59.158195 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:40:59.159073 systemd[1]: Stopped target network.target. Feb 12 19:40:59.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.164122 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:40:59.164237 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:40:59.164824 systemd[1]: Stopped target paths.target. Feb 12 19:40:59.165319 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:40:59.168345 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:40:59.168934 systemd[1]: Stopped target slices.target. Feb 12 19:40:59.170028 systemd[1]: Stopped target sockets.target. Feb 12 19:40:59.180967 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:40:59.181049 systemd[1]: Closed iscsid.socket. Feb 12 19:40:59.186246 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:40:59.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.186338 systemd[1]: Closed iscsiuio.socket. Feb 12 19:40:59.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.187583 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:40:59.187686 systemd[1]: Stopped ignition-setup.service. Feb 12 19:40:59.188953 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:40:59.189030 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:40:59.190133 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:40:59.192554 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:40:59.194436 systemd-networkd[687]: eth0: DHCPv6 lease lost Feb 12 19:40:59.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.198458 systemd-networkd[687]: eth1: DHCPv6 lease lost Feb 12 19:40:59.198682 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:40:59.198798 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:40:59.202000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:40:59.202917 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:40:59.203000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:40:59.203088 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:40:59.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.205776 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:40:59.205854 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:40:59.215923 systemd[1]: Stopping network-cleanup.service... Feb 12 19:40:59.217680 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:40:59.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.220092 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:40:59.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.220800 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:40:59.220881 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:40:59.221558 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:40:59.221622 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:40:59.236756 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:40:59.246787 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:40:59.251796 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:40:59.252029 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:40:59.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.253801 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:40:59.253976 systemd[1]: Stopped network-cleanup.service. Feb 12 19:40:59.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.255592 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:40:59.255658 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:40:59.256251 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:40:59.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.256301 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:40:59.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.257219 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:40:59.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.257279 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:40:59.258231 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:40:59.258288 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:40:59.259292 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:40:59.259384 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:40:59.262075 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:40:59.272466 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:40:59.272596 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:40:59.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.276581 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:40:59.282263 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:40:59.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.284702 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:40:59.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.284787 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:40:59.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.286874 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:40:59.287700 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:40:59.287844 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:40:59.288719 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:40:59.291837 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:40:59.316392 systemd[1]: Switching root. Feb 12 19:40:59.342080 systemd-journald[184]: Journal stopped Feb 12 19:41:06.938213 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Feb 12 19:41:06.938319 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:41:06.938390 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:41:06.938411 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:41:06.938430 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:41:06.938466 kernel: SELinux: policy capability open_perms=1 Feb 12 19:41:06.938489 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:41:06.938511 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:41:06.938528 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:41:06.938551 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:41:06.938568 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:41:06.938586 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:41:06.938607 systemd[1]: Successfully loaded SELinux policy in 88.957ms. Feb 12 19:41:06.938644 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.530ms. Feb 12 19:41:06.938671 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:41:06.938692 systemd[1]: Detected virtualization kvm. Feb 12 19:41:06.938711 systemd[1]: Detected architecture x86-64. Feb 12 19:41:06.938732 systemd[1]: Detected first boot. Feb 12 19:41:06.938754 systemd[1]: Hostname set to . Feb 12 19:41:06.938777 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:41:06.938797 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:41:06.938822 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:41:06.938843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:41:06.938864 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:41:06.938885 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:41:06.938906 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 12 19:41:06.938925 kernel: audit: type=1334 audit(1707766866.347:92): prog-id=12 op=LOAD Feb 12 19:41:06.938944 kernel: audit: type=1334 audit(1707766866.355:93): prog-id=3 op=UNLOAD Feb 12 19:41:06.938963 kernel: audit: type=1334 audit(1707766866.360:94): prog-id=13 op=LOAD Feb 12 19:41:06.938991 kernel: audit: type=1334 audit(1707766866.361:95): prog-id=14 op=LOAD Feb 12 19:41:06.939008 kernel: audit: type=1334 audit(1707766866.361:96): prog-id=4 op=UNLOAD Feb 12 19:41:06.939031 kernel: audit: type=1334 audit(1707766866.361:97): prog-id=5 op=UNLOAD Feb 12 19:41:06.939050 kernel: audit: type=1334 audit(1707766866.366:98): prog-id=15 op=LOAD Feb 12 19:41:06.939069 kernel: audit: type=1334 audit(1707766866.370:99): prog-id=12 op=UNLOAD Feb 12 19:41:06.939106 kernel: audit: type=1334 audit(1707766866.373:100): prog-id=16 op=LOAD Feb 12 19:41:06.939123 kernel: audit: type=1334 audit(1707766866.375:101): prog-id=17 op=LOAD Feb 12 19:41:06.939141 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:41:06.939164 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:41:06.939188 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:41:06.939209 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:41:06.939231 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:41:06.939263 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 19:41:06.939285 systemd[1]: Created slice system-getty.slice. Feb 12 19:41:06.943153 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:41:06.943236 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:41:06.943262 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:41:06.943282 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:41:06.943304 systemd[1]: Created slice user.slice. Feb 12 19:41:06.943343 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:41:06.943364 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:41:06.943400 systemd[1]: Set up automount boot.automount. Feb 12 19:41:06.943419 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:41:06.943438 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:41:06.943464 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:41:06.943483 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:41:06.943503 systemd[1]: Reached target integritysetup.target. Feb 12 19:41:06.943522 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:41:06.943542 systemd[1]: Reached target remote-fs.target. Feb 12 19:41:06.943563 systemd[1]: Reached target slices.target. Feb 12 19:41:06.943582 systemd[1]: Reached target swap.target. Feb 12 19:41:06.943603 systemd[1]: Reached target torcx.target. Feb 12 19:41:06.943624 systemd[1]: Reached target veritysetup.target. Feb 12 19:41:06.943645 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:41:06.943671 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:41:06.943696 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:41:06.943717 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:41:06.943736 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:41:06.943755 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:41:06.943774 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:41:06.943793 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:41:06.943812 systemd[1]: Mounting media.mount... Feb 12 19:41:06.943833 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:41:06.943861 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:41:06.943882 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:41:06.943901 systemd[1]: Mounting tmp.mount... Feb 12 19:41:06.943923 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:41:06.944506 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:41:06.944529 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:41:06.944547 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:41:06.944566 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:41:06.944586 systemd[1]: Starting modprobe@drm.service... Feb 12 19:41:06.944615 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:41:06.944634 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:41:06.944653 systemd[1]: Starting modprobe@loop.service... Feb 12 19:41:06.944673 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:41:06.944693 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:41:06.944711 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:41:06.944731 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:41:06.944750 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:41:06.944768 systemd[1]: Stopped systemd-journald.service. Feb 12 19:41:06.944791 systemd[1]: Starting systemd-journald.service... Feb 12 19:41:06.944811 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:41:06.944831 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:41:06.944852 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:41:06.944873 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:41:06.946350 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:41:06.946379 systemd[1]: Stopped verity-setup.service. Feb 12 19:41:06.946403 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:41:06.946426 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:41:06.946457 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:41:06.946479 systemd[1]: Mounted media.mount. Feb 12 19:41:06.946502 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:41:06.946521 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:41:06.946543 systemd[1]: Mounted tmp.mount. Feb 12 19:41:06.946574 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:41:06.946602 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:41:06.946622 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:41:06.946640 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:41:06.946658 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:41:06.946677 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:41:06.946702 systemd[1]: Finished modprobe@drm.service. Feb 12 19:41:06.946720 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:41:06.946741 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:41:06.946761 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:41:06.946780 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:41:06.946809 systemd-journald[951]: Journal started Feb 12 19:41:06.946914 systemd-journald[951]: Runtime Journal (/run/log/journal/70ca55c066f9489fb0947b2e1682752f) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:40:59.667000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:40:59.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:40:59.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:40:59.793000 audit: BPF prog-id=10 op=LOAD Feb 12 19:40:59.793000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:40:59.793000 audit: BPF prog-id=11 op=LOAD Feb 12 19:40:59.793000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:40:59.946000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:40:59.946000 audit[884]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.946000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:40:59.948000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:40:59.948000 audit[884]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.948000 audit: CWD cwd="/" Feb 12 19:40:59.948000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.948000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.948000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:41:06.347000 audit: BPF prog-id=12 op=LOAD Feb 12 19:41:06.355000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:41:06.360000 audit: BPF prog-id=13 op=LOAD Feb 12 19:41:06.361000 audit: BPF prog-id=14 op=LOAD Feb 12 19:41:06.361000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:41:06.361000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:41:06.366000 audit: BPF prog-id=15 op=LOAD Feb 12 19:41:06.370000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:41:06.373000 audit: BPF prog-id=16 op=LOAD Feb 12 19:41:06.375000 audit: BPF prog-id=17 op=LOAD Feb 12 19:41:06.375000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:41:06.375000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:41:06.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.398000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:41:06.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.814000 audit: BPF prog-id=18 op=LOAD Feb 12 19:41:06.814000 audit: BPF prog-id=19 op=LOAD Feb 12 19:41:06.814000 audit: BPF prog-id=20 op=LOAD Feb 12 19:41:06.814000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:41:06.814000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:41:06.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.933000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:41:06.933000 audit[951]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffdffb529d0 a2=4000 a3=7ffdffb52a6c items=0 ppid=1 pid=951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.933000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:40:59.941956 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:41:06.344467 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:41:06.957789 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:40:59.943506 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:41:06.344492 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:41:06.964671 systemd[1]: Started systemd-journald.service. Feb 12 19:41:06.964763 kernel: fuse: init (API version 7.34) Feb 12 19:41:06.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.943551 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:41:06.377203 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:40:59.943618 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:40:59.943634 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:40:59.943708 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:40:59.943731 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:40:59.944212 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:40:59.944306 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:40:59.944365 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:40:59.945542 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:40:59.945613 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:40:59.945649 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:40:59.945673 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:40:59.945704 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:40:59.945727 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:40:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:41:06.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:05.452495 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:41:05.453094 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:41:05.453358 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:41:05.454002 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:41:05.454119 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:41:05.454246 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2024-02-12T19:41:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:41:06.973509 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:41:06.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:06.974603 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:41:06.976173 systemd[1]: Reached target network-pre.target. Feb 12 19:41:06.980392 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:41:06.984822 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:41:06.985659 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:41:06.997852 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:41:07.002128 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:41:07.002972 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:41:07.009012 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:41:07.016827 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:41:07.065675 kernel: loop: module loaded Feb 12 19:41:07.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.066000 systemd-journald[951]: Time spent on flushing to /var/log/journal/70ca55c066f9489fb0947b2e1682752f is 95.131ms for 1168 entries. Feb 12 19:41:07.066000 systemd-journald[951]: System Journal (/var/log/journal/70ca55c066f9489fb0947b2e1682752f) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:41:07.189579 systemd-journald[951]: Received client request to flush runtime journal. Feb 12 19:41:07.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.060121 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:41:07.062625 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:41:07.062839 systemd[1]: Finished modprobe@loop.service. Feb 12 19:41:07.064429 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:41:07.065625 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:41:07.070736 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:41:07.075103 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:41:07.093194 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:41:07.192085 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:41:07.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.210497 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:41:07.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.213546 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:41:07.237968 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:41:07.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.288053 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:41:07.319796 udevadm[995]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:41:07.363499 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:41:07.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:07.366418 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:41:07.431709 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:41:07.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:08.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:08.585709 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:41:08.587000 audit: BPF prog-id=21 op=LOAD Feb 12 19:41:08.588000 audit: BPF prog-id=22 op=LOAD Feb 12 19:41:08.588000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:41:08.588000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:41:08.590351 systemd[1]: Starting systemd-udevd.service... Feb 12 19:41:08.645115 systemd-udevd[998]: Using default interface naming scheme 'v252'. Feb 12 19:41:08.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:08.724000 audit: BPF prog-id=23 op=LOAD Feb 12 19:41:08.720973 systemd[1]: Started systemd-udevd.service. Feb 12 19:41:08.735228 systemd[1]: Starting systemd-networkd.service... Feb 12 19:41:08.760000 audit: BPF prog-id=24 op=LOAD Feb 12 19:41:08.760000 audit: BPF prog-id=25 op=LOAD Feb 12 19:41:08.760000 audit: BPF prog-id=26 op=LOAD Feb 12 19:41:08.762290 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:41:08.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:08.870251 systemd[1]: Started systemd-userdbd.service. Feb 12 19:41:08.906238 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:41:08.914219 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:41:08.992425 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:41:09.008591 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:41:09.016257 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:41:09.019486 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:41:09.025799 systemd[1]: Starting modprobe@loop.service... Feb 12 19:41:09.027520 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:41:09.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.027636 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:41:09.027784 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:41:09.030037 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:41:09.030361 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:41:09.035708 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:41:09.048298 systemd[1]: Finished modprobe@loop.service. Feb 12 19:41:09.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.055173 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:41:09.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.057187 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:41:09.057563 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:41:09.058851 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:41:09.132563 systemd-networkd[1010]: lo: Link UP Feb 12 19:41:09.132579 systemd-networkd[1010]: lo: Gained carrier Feb 12 19:41:09.134337 systemd-networkd[1010]: Enumeration completed Feb 12 19:41:09.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.134491 systemd-networkd[1010]: eth1: Configuring with /run/systemd/network/10-26:75:d5:2d:49:6a.network. Feb 12 19:41:09.134827 systemd[1]: Started systemd-networkd.service. Feb 12 19:41:09.137233 systemd-networkd[1010]: eth0: Configuring with /run/systemd/network/10-aa:c9:b3:6e:58:61.network. Feb 12 19:41:09.139029 systemd-networkd[1010]: eth1: Link UP Feb 12 19:41:09.139044 systemd-networkd[1010]: eth1: Gained carrier Feb 12 19:41:09.145941 systemd-networkd[1010]: eth0: Link UP Feb 12 19:41:09.145955 systemd-networkd[1010]: eth0: Gained carrier Feb 12 19:41:09.192398 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 12 19:41:09.215547 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:41:09.268000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:41:09.268000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55b86996d6a0 a1=32194 a2=7ff1bf92ebc5 a3=5 items=108 ppid=998 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.268000 audit: CWD cwd="/" Feb 12 19:41:09.268000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=1 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=2 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=3 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=4 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=5 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=6 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=7 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=8 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=9 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=10 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=11 name=(null) inode=14034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=12 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=13 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=14 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=15 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=16 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=17 name=(null) inode=14037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=18 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=19 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=20 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=21 name=(null) inode=14039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=22 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=23 name=(null) inode=14040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=24 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=25 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=26 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=27 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=28 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=29 name=(null) inode=14043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=30 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=31 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=32 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=33 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=34 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=35 name=(null) inode=14046 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=36 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=37 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=38 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=39 name=(null) inode=14048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=40 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=41 name=(null) inode=14049 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=42 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=43 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=44 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=45 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=46 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=47 name=(null) inode=14052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=48 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=49 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=50 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=51 name=(null) inode=14054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=52 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=53 name=(null) inode=14055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=55 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=56 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=57 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=58 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=59 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=60 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=61 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=62 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=63 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=64 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=65 name=(null) inode=14061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=66 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=67 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=68 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=69 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=70 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=71 name=(null) inode=14064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=72 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=73 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=74 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=75 name=(null) inode=14066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=76 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=77 name=(null) inode=14067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=78 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=79 name=(null) inode=14068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=80 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=81 name=(null) inode=14069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=82 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=83 name=(null) inode=14070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=84 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=85 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=86 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=87 name=(null) inode=14072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=88 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=89 name=(null) inode=14073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=90 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=91 name=(null) inode=14074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=92 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=93 name=(null) inode=14075 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=94 name=(null) inode=14071 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=95 name=(null) inode=14076 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=96 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=97 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=98 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=99 name=(null) inode=14078 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=100 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=101 name=(null) inode=14079 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=102 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=103 name=(null) inode=14080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=104 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=105 name=(null) inode=14081 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=106 name=(null) inode=14077 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PATH item=107 name=(null) inode=14082 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:09.268000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:41:09.378368 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 19:41:09.427959 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 19:41:09.452360 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:41:09.644633 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:41:09.760574 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:41:09.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.763621 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:41:09.814809 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:41:09.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.860303 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:41:09.861953 systemd[1]: Reached target cryptsetup.target. Feb 12 19:41:09.865602 systemd[1]: Starting lvm2-activation.service... Feb 12 19:41:09.892319 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:41:09.942308 systemd[1]: Finished lvm2-activation.service. Feb 12 19:41:09.944220 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:41:09.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.947630 systemd[1]: Mounting media-configdrive.mount... Feb 12 19:41:09.948298 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:41:09.948436 systemd[1]: Reached target machines.target. Feb 12 19:41:09.951072 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:41:10.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:10.002883 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:41:10.020443 kernel: ISO 9660 Extensions: RRIP_1991A Feb 12 19:41:10.023061 systemd[1]: Mounted media-configdrive.mount. Feb 12 19:41:10.023737 systemd[1]: Reached target local-fs.target. Feb 12 19:41:10.026231 systemd[1]: Starting ldconfig.service... Feb 12 19:41:10.032410 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:41:10.032506 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:41:10.034836 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:41:10.043048 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:41:10.045079 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:41:10.045282 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:41:10.047948 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:41:10.089382 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Feb 12 19:41:10.097668 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:41:10.168558 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:41:10.196591 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:41:10.203706 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:41:10.396449 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:41:10.397569 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:41:10.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:10.501001 systemd-fsck[1049]: fsck.fat 4.2 (2021-01-31) Feb 12 19:41:10.501001 systemd-fsck[1049]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 19:41:10.503287 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:41:10.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:10.513649 systemd[1]: Mounting boot.mount... Feb 12 19:41:10.548376 systemd[1]: Mounted boot.mount. Feb 12 19:41:10.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:10.657019 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:41:10.712177 systemd-networkd[1010]: eth0: Gained IPv6LL Feb 12 19:41:10.776748 systemd-networkd[1010]: eth1: Gained IPv6LL Feb 12 19:41:11.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:11.105238 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:41:11.110003 systemd[1]: Starting audit-rules.service... Feb 12 19:41:11.113971 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:41:11.117368 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:41:11.129000 audit: BPF prog-id=27 op=LOAD Feb 12 19:41:11.133026 systemd[1]: Starting systemd-resolved.service... Feb 12 19:41:11.141000 audit: BPF prog-id=28 op=LOAD Feb 12 19:41:11.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:11.143393 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:41:11.148718 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:41:11.151908 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:41:11.156248 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:41:11.206000 audit[1061]: SYSTEM_BOOT pid=1061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:41:11.213375 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:41:11.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:11.282166 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:41:11.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:11.331091 augenrules[1072]: No rules Feb 12 19:41:11.329000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:41:11.329000 audit[1072]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffead9ef7c0 a2=420 a3=0 items=0 ppid=1052 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:11.329000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:41:11.331881 systemd[1]: Finished audit-rules.service. Feb 12 19:41:11.346998 systemd-resolved[1056]: Positive Trust Anchors: Feb 12 19:41:11.347721 systemd-resolved[1056]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:41:11.348650 systemd-resolved[1056]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:41:11.367571 systemd-resolved[1056]: Using system hostname 'ci-3510.3.2-f-c9b648f98a'. Feb 12 19:41:11.375845 systemd[1]: Started systemd-resolved.service. Feb 12 19:41:11.376610 systemd[1]: Reached target network.target. Feb 12 19:41:11.377134 systemd[1]: Reached target nss-lookup.target. Feb 12 19:41:11.440584 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:41:11.441384 systemd[1]: Reached target time-set.target. Feb 12 19:41:12.390996 systemd-timesyncd[1060]: Contacted time server 23.131.160.7:123 (0.flatcar.pool.ntp.org). Feb 12 19:41:12.391119 systemd-timesyncd[1060]: Initial clock synchronization to Mon 2024-02-12 19:41:12.390803 UTC. Feb 12 19:41:12.392503 systemd-resolved[1056]: Clock change detected. Flushing caches. Feb 12 19:41:12.586925 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:41:12.612744 systemd[1]: Finished ldconfig.service. Feb 12 19:41:12.616876 systemd[1]: Starting systemd-update-done.service... Feb 12 19:41:12.635019 systemd[1]: Finished systemd-update-done.service. Feb 12 19:41:12.635910 systemd[1]: Reached target sysinit.target. Feb 12 19:41:12.636827 systemd[1]: Started motdgen.path. Feb 12 19:41:12.637689 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:41:12.638712 systemd[1]: Started logrotate.timer. Feb 12 19:41:12.651845 systemd[1]: Started mdadm.timer. Feb 12 19:41:12.654977 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:41:12.655593 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:41:12.655650 systemd[1]: Reached target paths.target. Feb 12 19:41:12.662248 systemd[1]: Reached target timers.target. Feb 12 19:41:12.666479 systemd[1]: Listening on dbus.socket. Feb 12 19:41:12.669891 systemd[1]: Starting docker.socket... Feb 12 19:41:12.681518 systemd[1]: Listening on sshd.socket. Feb 12 19:41:12.682530 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:41:12.684094 systemd[1]: Listening on docker.socket. Feb 12 19:41:12.684825 systemd[1]: Reached target sockets.target. Feb 12 19:41:12.685349 systemd[1]: Reached target basic.target. Feb 12 19:41:12.685899 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:41:12.685932 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:41:12.688909 systemd[1]: Starting containerd.service... Feb 12 19:41:12.691949 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 19:41:12.699503 systemd[1]: Starting dbus.service... Feb 12 19:41:12.708319 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:41:12.720100 systemd[1]: Starting extend-filesystems.service... Feb 12 19:41:12.722379 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:41:12.725340 systemd[1]: Starting motdgen.service... Feb 12 19:41:12.741151 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:41:12.769066 systemd[1]: Starting prepare-critools.service... Feb 12 19:41:12.785032 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:41:12.795439 jq[1086]: false Feb 12 19:41:12.792161 systemd[1]: Starting sshd-keygen.service... Feb 12 19:41:12.923663 systemd[1]: Starting systemd-logind.service... Feb 12 19:41:12.924630 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:41:12.924819 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:41:12.930464 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:41:12.943297 systemd[1]: Starting update-engine.service... Feb 12 19:41:12.949899 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:41:12.960092 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:41:12.960540 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:41:12.968541 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:41:12.968850 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:41:12.974304 jq[1103]: true Feb 12 19:41:12.982150 tar[1105]: ./ Feb 12 19:41:13.024503 tar[1105]: ./loopback Feb 12 19:41:13.041031 extend-filesystems[1087]: Found vda Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda1 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda2 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda3 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found usr Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda4 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda6 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda7 Feb 12 19:41:13.042414 extend-filesystems[1087]: Found vda9 Feb 12 19:41:13.042414 extend-filesystems[1087]: Checking size of /dev/vda9 Feb 12 19:41:13.069654 tar[1106]: crictl Feb 12 19:41:13.074764 dbus-daemon[1085]: [system] SELinux support is enabled Feb 12 19:41:13.075209 systemd[1]: Started dbus.service. Feb 12 19:41:13.079939 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:41:13.080005 systemd[1]: Reached target system-config.target. Feb 12 19:41:13.080695 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:41:13.087488 systemd[1]: Starting user-configdrive.service... Feb 12 19:41:13.137264 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:41:13.137548 systemd[1]: Finished motdgen.service. Feb 12 19:41:13.164782 jq[1108]: true Feb 12 19:41:13.219740 extend-filesystems[1087]: Resized partition /dev/vda9 Feb 12 19:41:13.238319 extend-filesystems[1130]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:41:13.305800 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 12 19:41:13.445263 update_engine[1101]: I0212 19:41:13.443496 1101 main.cc:92] Flatcar Update Engine starting Feb 12 19:41:13.449902 coreos-cloudinit[1116]: 2024/02/12 19:41:13 Checking availability of "cloud-drive" Feb 12 19:41:13.454614 coreos-cloudinit[1116]: 2024/02/12 19:41:13 Fetching user-data from datasource of type "cloud-drive" Feb 12 19:41:13.455138 coreos-cloudinit[1116]: 2024/02/12 19:41:13 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 12 19:41:13.461356 coreos-cloudinit[1116]: 2024/02/12 19:41:13 Fetching meta-data from datasource of type "cloud-drive" Feb 12 19:41:13.465179 coreos-cloudinit[1116]: 2024/02/12 19:41:13 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 12 19:41:13.471154 systemd[1]: Started update-engine.service. Feb 12 19:41:13.476585 update_engine[1101]: I0212 19:41:13.476505 1101 update_check_scheduler.cc:74] Next update check in 3m8s Feb 12 19:41:13.488522 systemd[1]: Started locksmithd.service. Feb 12 19:41:13.539846 coreos-cloudinit[1116]: Detected an Ignition config. Exiting... Feb 12 19:41:13.542420 systemd[1]: Finished user-configdrive.service. Feb 12 19:41:13.543545 systemd[1]: Reached target user-config.target. Feb 12 19:41:13.580575 coreos-metadata[1082]: Feb 12 19:41:13.580 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:41:13.614830 coreos-metadata[1082]: Feb 12 19:41:13.614 INFO Fetch successful Feb 12 19:41:13.672346 systemd-logind[1100]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:41:13.676086 systemd-logind[1100]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:41:13.677797 systemd-logind[1100]: New seat seat0. Feb 12 19:41:13.681916 unknown[1082]: wrote ssh authorized keys file for user: core Feb 12 19:41:13.685647 bash[1146]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:41:13.687086 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:41:13.690218 systemd[1]: Started systemd-logind.service. Feb 12 19:41:13.716901 tar[1105]: ./bandwidth Feb 12 19:41:13.753035 env[1109]: time="2024-02-12T19:41:13.752864034Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:41:13.784075 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 12 19:41:13.785255 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 19:41:14.051759 env[1109]: time="2024-02-12T19:41:13.869703632Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:41:14.051850 update-ssh-keys[1148]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:41:14.055438 extend-filesystems[1130]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:41:14.055438 extend-filesystems[1130]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 12 19:41:14.055438 extend-filesystems[1130]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 12 19:41:14.055340 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:41:14.063544 extend-filesystems[1087]: Resized filesystem in /dev/vda9 Feb 12 19:41:14.063544 extend-filesystems[1087]: Found vdb Feb 12 19:41:14.055678 systemd[1]: Finished extend-filesystems.service. Feb 12 19:41:14.068924 env[1109]: time="2024-02-12T19:41:14.065234731Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.069556 env[1109]: time="2024-02-12T19:41:14.069469178Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:41:14.069656 env[1109]: time="2024-02-12T19:41:14.069550389Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.070382 env[1109]: time="2024-02-12T19:41:14.070166396Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:41:14.070382 env[1109]: time="2024-02-12T19:41:14.070226501Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.070382 env[1109]: time="2024-02-12T19:41:14.070251438Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:41:14.070382 env[1109]: time="2024-02-12T19:41:14.070267861Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.070648 env[1109]: time="2024-02-12T19:41:14.070473423Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.071321 env[1109]: time="2024-02-12T19:41:14.071277457Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:41:14.073532 env[1109]: time="2024-02-12T19:41:14.072006461Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:41:14.073532 env[1109]: time="2024-02-12T19:41:14.072074830Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:41:14.073532 env[1109]: time="2024-02-12T19:41:14.072316105Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:41:14.073532 env[1109]: time="2024-02-12T19:41:14.072382333Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087499752Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087576841Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087599653Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087651621Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087676592Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087731935Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087760457Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087784237Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087806984Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087827273Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087850131Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.087869128Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.088173426Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:41:14.089087 env[1109]: time="2024-02-12T19:41:14.088356092Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.088796000Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.088852579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.088877428Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.088963430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.088988656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.090009 env[1109]: time="2024-02-12T19:41:14.089010816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.089030723Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090406718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090440501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090462864Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090514552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090547975Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090797846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090829114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090850766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090871334Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090898987Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090918578Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.090946330Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:41:14.091084 env[1109]: time="2024-02-12T19:41:14.091005673Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:41:14.093439 env[1109]: time="2024-02-12T19:41:14.092969075Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:41:14.098075 env[1109]: time="2024-02-12T19:41:14.094334570Z" level=info msg="Connect containerd service" Feb 12 19:41:14.098075 env[1109]: time="2024-02-12T19:41:14.096695605Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:41:14.099621 env[1109]: time="2024-02-12T19:41:14.099563318Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:41:14.102688 env[1109]: time="2024-02-12T19:41:14.102634946Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:41:14.104902 env[1109]: time="2024-02-12T19:41:14.104730176Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:41:14.107537 env[1109]: time="2024-02-12T19:41:14.107456992Z" level=info msg="Start subscribing containerd event" Feb 12 19:41:14.108076 env[1109]: time="2024-02-12T19:41:14.107997220Z" level=info msg="Start recovering state" Feb 12 19:41:14.108434 env[1109]: time="2024-02-12T19:41:14.108406203Z" level=info msg="Start event monitor" Feb 12 19:41:14.108701 env[1109]: time="2024-02-12T19:41:14.108674823Z" level=info msg="Start snapshots syncer" Feb 12 19:41:14.110164 env[1109]: time="2024-02-12T19:41:14.110119182Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:41:14.110501 env[1109]: time="2024-02-12T19:41:14.110473672Z" level=info msg="Start streaming server" Feb 12 19:41:14.123590 env[1109]: time="2024-02-12T19:41:14.123522532Z" level=info msg="containerd successfully booted in 0.391653s" Feb 12 19:41:14.123673 systemd[1]: Started containerd.service. Feb 12 19:41:14.227743 tar[1105]: ./ptp Feb 12 19:41:14.395940 tar[1105]: ./vlan Feb 12 19:41:14.539863 tar[1105]: ./host-device Feb 12 19:41:14.642187 tar[1105]: ./tuning Feb 12 19:41:14.769500 tar[1105]: ./vrf Feb 12 19:41:14.831905 tar[1105]: ./sbr Feb 12 19:41:14.908149 tar[1105]: ./tap Feb 12 19:41:15.053309 tar[1105]: ./dhcp Feb 12 19:41:15.361161 tar[1105]: ./static Feb 12 19:41:15.412747 tar[1105]: ./firewall Feb 12 19:41:15.488401 tar[1105]: ./macvlan Feb 12 19:41:15.496143 sshd_keygen[1098]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:41:15.520253 systemd[1]: Finished prepare-critools.service. Feb 12 19:41:15.549023 systemd[1]: Finished sshd-keygen.service. Feb 12 19:41:15.553706 systemd[1]: Starting issuegen.service... Feb 12 19:41:15.565106 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:41:15.565414 systemd[1]: Finished issuegen.service. Feb 12 19:41:15.569092 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:41:15.584749 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:41:15.588540 systemd[1]: Started getty@tty1.service. Feb 12 19:41:15.590174 tar[1105]: ./dummy Feb 12 19:41:15.592121 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:41:15.593201 systemd[1]: Reached target getty.target. Feb 12 19:41:15.668109 tar[1105]: ./bridge Feb 12 19:41:15.688542 locksmithd[1136]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:41:15.775169 tar[1105]: ./ipvlan Feb 12 19:41:15.865536 tar[1105]: ./portmap Feb 12 19:41:15.948910 tar[1105]: ./host-local Feb 12 19:41:16.064581 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:41:16.065847 systemd[1]: Reached target multi-user.target. Feb 12 19:41:16.070682 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:41:16.101684 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:41:16.101951 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:41:16.104913 systemd[1]: Startup finished in 1.214s (kernel) + 7.705s (initrd) + 15.649s (userspace) = 24.569s. Feb 12 19:41:21.046325 systemd[1]: Created slice system-sshd.slice. Feb 12 19:41:21.049986 systemd[1]: Started sshd@0-164.92.111.11:22-139.178.68.195:41760.service. Feb 12 19:41:21.207616 sshd[1177]: Accepted publickey for core from 139.178.68.195 port 41760 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:21.210371 sshd[1177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:21.243541 systemd[1]: Created slice user-500.slice. Feb 12 19:41:21.246542 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:41:21.254201 systemd-logind[1100]: New session 1 of user core. Feb 12 19:41:21.275577 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:41:21.279740 systemd[1]: Starting user@500.service... Feb 12 19:41:21.287240 (systemd)[1180]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:21.435191 systemd[1180]: Queued start job for default target default.target. Feb 12 19:41:21.436032 systemd[1180]: Reached target paths.target. Feb 12 19:41:21.436097 systemd[1180]: Reached target sockets.target. Feb 12 19:41:21.436112 systemd[1180]: Reached target timers.target. Feb 12 19:41:21.436125 systemd[1180]: Reached target basic.target. Feb 12 19:41:21.436182 systemd[1180]: Reached target default.target. Feb 12 19:41:21.436217 systemd[1180]: Startup finished in 137ms. Feb 12 19:41:21.437022 systemd[1]: Started user@500.service. Feb 12 19:41:21.439737 systemd[1]: Started session-1.scope. Feb 12 19:41:21.526147 systemd[1]: Started sshd@1-164.92.111.11:22-139.178.68.195:41772.service. Feb 12 19:41:21.599485 sshd[1189]: Accepted publickey for core from 139.178.68.195 port 41772 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:21.603474 sshd[1189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:21.616335 systemd[1]: Started session-2.scope. Feb 12 19:41:21.617137 systemd-logind[1100]: New session 2 of user core. Feb 12 19:41:21.715522 sshd[1189]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:21.724876 systemd[1]: Started sshd@2-164.92.111.11:22-139.178.68.195:41780.service. Feb 12 19:41:21.725796 systemd[1]: sshd@1-164.92.111.11:22-139.178.68.195:41772.service: Deactivated successfully. Feb 12 19:41:21.727394 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:41:21.728542 systemd-logind[1100]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:41:21.730760 systemd-logind[1100]: Removed session 2. Feb 12 19:41:21.808078 sshd[1194]: Accepted publickey for core from 139.178.68.195 port 41780 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:21.811993 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:21.828843 systemd[1]: Started session-3.scope. Feb 12 19:41:21.830589 systemd-logind[1100]: New session 3 of user core. Feb 12 19:41:21.917246 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:21.925107 systemd[1]: Started sshd@3-164.92.111.11:22-139.178.68.195:41782.service. Feb 12 19:41:21.926123 systemd[1]: sshd@2-164.92.111.11:22-139.178.68.195:41780.service: Deactivated successfully. Feb 12 19:41:21.928280 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:41:21.930513 systemd-logind[1100]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:41:21.932683 systemd-logind[1100]: Removed session 3. Feb 12 19:41:21.997932 sshd[1200]: Accepted publickey for core from 139.178.68.195 port 41782 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:22.002180 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:22.030858 systemd[1]: Started session-4.scope. Feb 12 19:41:22.031806 systemd-logind[1100]: New session 4 of user core. Feb 12 19:41:22.112555 sshd[1200]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:22.117810 systemd[1]: Started sshd@4-164.92.111.11:22-139.178.68.195:41786.service. Feb 12 19:41:22.121533 systemd[1]: sshd@3-164.92.111.11:22-139.178.68.195:41782.service: Deactivated successfully. Feb 12 19:41:22.122586 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:41:22.124366 systemd-logind[1100]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:41:22.126105 systemd-logind[1100]: Removed session 4. Feb 12 19:41:22.180262 sshd[1206]: Accepted publickey for core from 139.178.68.195 port 41786 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:22.183666 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:22.192998 systemd[1]: Started session-5.scope. Feb 12 19:41:22.194184 systemd-logind[1100]: New session 5 of user core. Feb 12 19:41:22.300111 sudo[1210]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:41:22.301280 sudo[1210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:41:22.314530 dbus-daemon[1085]: \xd0\xddq9\xc5U: received setenforce notice (enforcing=-1519498112) Feb 12 19:41:22.317697 sudo[1210]: pam_unix(sudo:session): session closed for user root Feb 12 19:41:22.325538 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:22.335930 systemd[1]: Started sshd@5-164.92.111.11:22-139.178.68.195:41796.service. Feb 12 19:41:22.342075 systemd[1]: sshd@4-164.92.111.11:22-139.178.68.195:41786.service: Deactivated successfully. Feb 12 19:41:22.343798 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:41:22.345272 systemd-logind[1100]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:41:22.347296 systemd-logind[1100]: Removed session 5. Feb 12 19:41:22.400942 sshd[1213]: Accepted publickey for core from 139.178.68.195 port 41796 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:22.403674 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:22.414180 systemd[1]: Started session-6.scope. Feb 12 19:41:22.415227 systemd-logind[1100]: New session 6 of user core. Feb 12 19:41:22.484565 sudo[1218]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:41:22.484888 sudo[1218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:41:22.490313 sudo[1218]: pam_unix(sudo:session): session closed for user root Feb 12 19:41:22.501004 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:41:22.501968 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:41:22.527000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:41:22.529401 kernel: kauditd_printk_skb: 190 callbacks suppressed Feb 12 19:41:22.529609 kernel: audit: type=1305 audit(1707766882.527:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:41:22.527000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa0406000 a2=420 a3=0 items=0 ppid=1 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.536066 kernel: audit: type=1300 audit(1707766882.527:177): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa0406000 a2=420 a3=0 items=0 ppid=1 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.536391 auditctl[1221]: No rules Feb 12 19:41:22.536736 systemd[1]: Stopping audit-rules.service... Feb 12 19:41:22.538109 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:41:22.538349 systemd[1]: Stopped audit-rules.service. Feb 12 19:41:22.527000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:41:22.543825 kernel: audit: type=1327 audit(1707766882.527:177): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:41:22.543991 kernel: audit: type=1131 audit(1707766882.537:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.544973 systemd[1]: Starting audit-rules.service... Feb 12 19:41:22.580150 augenrules[1238]: No rules Feb 12 19:41:22.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.583941 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 12 19:41:22.582177 systemd[1]: Finished audit-rules.service. Feb 12 19:41:22.581000 audit[1217]: USER_END pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.592541 kernel: audit: type=1130 audit(1707766882.580:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.592788 kernel: audit: type=1106 audit(1707766882.581:180): pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.581000 audit[1217]: CRED_DISP pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.597002 kernel: audit: type=1104 audit(1707766882.581:181): pid=1217 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.604513 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:22.622777 kernel: audit: type=1106 audit(1707766882.601:182): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.622913 kernel: audit: type=1104 audit(1707766882.601:183): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.601000 audit[1213]: USER_END pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.601000 audit[1213]: CRED_DISP pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.624920 systemd[1]: sshd@5-164.92.111.11:22-139.178.68.195:41796.service: Deactivated successfully. Feb 12 19:41:22.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-164.92.111.11:22-139.178.68.195:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.626917 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:41:22.630469 kernel: audit: type=1131 audit(1707766882.624:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-164.92.111.11:22-139.178.68.195:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.630274 systemd-logind[1100]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:41:22.631830 systemd[1]: Started sshd@6-164.92.111.11:22-139.178.68.195:41798.service. Feb 12 19:41:22.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.111.11:22-139.178.68.195:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.636198 systemd-logind[1100]: Removed session 6. Feb 12 19:41:22.690000 audit[1244]: USER_ACCT pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.692323 sshd[1244]: Accepted publickey for core from 139.178.68.195 port 41798 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:22.693000 audit[1244]: CRED_ACQ pid=1244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.693000 audit[1244]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae431cf0 a2=3 a3=0 items=0 ppid=1 pid=1244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:22.695204 sshd[1244]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:22.707397 systemd[1]: Started session-7.scope. Feb 12 19:41:22.709824 systemd-logind[1100]: New session 7 of user core. Feb 12 19:41:22.717000 audit[1244]: USER_START pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.720000 audit[1246]: CRED_ACQ pid=1246 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:22.777000 audit[1247]: USER_ACCT pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.778256 sudo[1247]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:41:22.777000 audit[1247]: CRED_REFR pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.778668 sudo[1247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:41:22.781000 audit[1247]: USER_START pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:23.388942 systemd[1]: Reloading. Feb 12 19:41:23.542617 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-12T19:41:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:41:23.555151 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-12T19:41:23Z" level=info msg="torcx already run" Feb 12 19:41:23.700534 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:41:23.701290 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:41:23.742276 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:41:23.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.846000 audit: BPF prog-id=34 op=LOAD Feb 12 19:41:23.846000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit: BPF prog-id=35 op=LOAD Feb 12 19:41:23.847000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit: BPF prog-id=36 op=LOAD Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.847000 audit: BPF prog-id=37 op=LOAD Feb 12 19:41:23.847000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:41:23.847000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.850000 audit: BPF prog-id=38 op=LOAD Feb 12 19:41:23.850000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit: BPF prog-id=39 op=LOAD Feb 12 19:41:23.852000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit: BPF prog-id=40 op=LOAD Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.852000 audit: BPF prog-id=41 op=LOAD Feb 12 19:41:23.852000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:41:23.852000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.854000 audit: BPF prog-id=42 op=LOAD Feb 12 19:41:23.854000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit: BPF prog-id=43 op=LOAD Feb 12 19:41:23.857000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit: BPF prog-id=44 op=LOAD Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.857000 audit: BPF prog-id=45 op=LOAD Feb 12 19:41:23.857000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:41:23.857000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.859000 audit: BPF prog-id=46 op=LOAD Feb 12 19:41:23.859000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit: BPF prog-id=47 op=LOAD Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:23.860000 audit: BPF prog-id=48 op=LOAD Feb 12 19:41:23.860000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:41:23.860000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:41:23.899971 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:41:23.910747 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:41:23.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:23.915722 systemd[1]: Reached target network-online.target. Feb 12 19:41:23.918577 systemd[1]: Started kubelet.service. Feb 12 19:41:23.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:23.940011 systemd[1]: Starting coreos-metadata.service... Feb 12 19:41:24.012231 coreos-metadata[1331]: Feb 12 19:41:24.006 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:41:24.026450 coreos-metadata[1331]: Feb 12 19:41:24.026 INFO Fetch successful Feb 12 19:41:24.054763 systemd[1]: Finished coreos-metadata.service. Feb 12 19:41:24.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:24.074213 kubelet[1323]: E0212 19:41:24.074102 1323 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:41:24.079665 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:41:24.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:41:24.079900 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:41:24.610691 systemd[1]: Stopped kubelet.service. Feb 12 19:41:24.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:24.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:24.639707 systemd[1]: Reloading. Feb 12 19:41:24.775744 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2024-02-12T19:41:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:41:24.794171 /usr/lib/systemd/system-generators/torcx-generator[1390]: time="2024-02-12T19:41:24Z" level=info msg="torcx already run" Feb 12 19:41:24.910222 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:41:24.910972 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:41:24.944890 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.041000 audit: BPF prog-id=49 op=LOAD Feb 12 19:41:25.041000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.043000 audit: BPF prog-id=50 op=LOAD Feb 12 19:41:25.043000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:41:25.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit: BPF prog-id=51 op=LOAD Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.045000 audit: BPF prog-id=52 op=LOAD Feb 12 19:41:25.045000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:41:25.045000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.050000 audit: BPF prog-id=53 op=LOAD Feb 12 19:41:25.050000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.053000 audit: BPF prog-id=54 op=LOAD Feb 12 19:41:25.053000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.054000 audit: BPF prog-id=55 op=LOAD Feb 12 19:41:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.055000 audit: BPF prog-id=56 op=LOAD Feb 12 19:41:25.055000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:41:25.055000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:41:25.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.057000 audit: BPF prog-id=57 op=LOAD Feb 12 19:41:25.057000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.060000 audit: BPF prog-id=58 op=LOAD Feb 12 19:41:25.060000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:41:25.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit: BPF prog-id=59 op=LOAD Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.061000 audit: BPF prog-id=60 op=LOAD Feb 12 19:41:25.061000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:41:25.061000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:41:25.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit: BPF prog-id=61 op=LOAD Feb 12 19:41:25.063000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit: BPF prog-id=62 op=LOAD Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.064000 audit: BPF prog-id=63 op=LOAD Feb 12 19:41:25.064000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:41:25.064000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:41:25.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:25.090077 systemd[1]: Started kubelet.service. Feb 12 19:41:25.180520 kubelet[1434]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:41:25.181079 kubelet[1434]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:41:25.181193 kubelet[1434]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:41:25.181431 kubelet[1434]: I0212 19:41:25.181377 1434 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:41:25.757472 kubelet[1434]: I0212 19:41:25.757397 1434 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:41:25.757772 kubelet[1434]: I0212 19:41:25.757739 1434 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:41:25.758374 kubelet[1434]: I0212 19:41:25.758331 1434 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:41:25.763660 kubelet[1434]: I0212 19:41:25.763608 1434 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:41:25.769351 kubelet[1434]: I0212 19:41:25.769305 1434 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:41:25.769966 kubelet[1434]: I0212 19:41:25.769930 1434 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:41:25.770303 kubelet[1434]: I0212 19:41:25.770274 1434 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:41:25.770617 kubelet[1434]: I0212 19:41:25.770591 1434 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:41:25.770788 kubelet[1434]: I0212 19:41:25.770770 1434 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:41:25.771141 kubelet[1434]: I0212 19:41:25.771115 1434 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:41:25.780427 kubelet[1434]: I0212 19:41:25.780370 1434 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:41:25.780670 kubelet[1434]: I0212 19:41:25.780444 1434 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:41:25.780670 kubelet[1434]: I0212 19:41:25.780481 1434 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:41:25.780670 kubelet[1434]: I0212 19:41:25.780544 1434 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:41:25.784222 kubelet[1434]: E0212 19:41:25.784185 1434 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:25.784965 kubelet[1434]: I0212 19:41:25.784922 1434 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:41:25.785405 kubelet[1434]: E0212 19:41:25.785378 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:25.785546 kubelet[1434]: W0212 19:41:25.785522 1434 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:41:25.786742 kubelet[1434]: I0212 19:41:25.786700 1434 server.go:1168] "Started kubelet" Feb 12 19:41:25.791303 kubelet[1434]: I0212 19:41:25.791115 1434 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:41:25.792804 kubelet[1434]: E0212 19:41:25.792762 1434 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:41:25.792983 kubelet[1434]: E0212 19:41:25.792814 1434 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:41:25.792000 audit[1434]: AVC avc: denied { mac_admin } for pid=1434 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:41:25.792000 audit[1434]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005d1380 a1=c00005b200 a2=c0005d1320 a3=25 items=0 ppid=1 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:41:25.799160 kubelet[1434]: I0212 19:41:25.799096 1434 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:41:25.798000 audit[1434]: AVC avc: denied { mac_admin } for pid=1434 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.798000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:41:25.798000 audit[1434]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b58940 a1=c00005b230 a2=c0005d1410 a3=25 items=0 ppid=1 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.798000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:41:25.799811 kubelet[1434]: I0212 19:41:25.799775 1434 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:41:25.800053 kubelet[1434]: I0212 19:41:25.800024 1434 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:41:25.803301 kubelet[1434]: E0212 19:41:25.803126 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3a7d2191", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 786657169, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 786657169, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.809714 kubelet[1434]: I0212 19:41:25.809678 1434 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:41:25.814090 kubelet[1434]: I0212 19:41:25.813412 1434 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:41:25.823113 kubelet[1434]: E0212 19:41:25.811259 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3adacef7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 792796407, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 792796407, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.823474 kubelet[1434]: W0212 19:41:25.811436 1434 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "164.92.111.11" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:41:25.823703 kubelet[1434]: E0212 19:41:25.823687 1434 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "164.92.111.11" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:41:25.823817 kubelet[1434]: W0212 19:41:25.811486 1434 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:41:25.823959 kubelet[1434]: E0212 19:41:25.823925 1434 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:41:25.839130 kubelet[1434]: I0212 19:41:25.826880 1434 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:41:25.839130 kubelet[1434]: I0212 19:41:25.827728 1434 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:41:25.839130 kubelet[1434]: E0212 19:41:25.829223 1434 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"164.92.111.11\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:41:25.839130 kubelet[1434]: W0212 19:41:25.829966 1434 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:41:25.839130 kubelet[1434]: E0212 19:41:25.829999 1434 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:41:25.878133 kubelet[1434]: I0212 19:41:25.878024 1434 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:41:25.878349 kubelet[1434]: I0212 19:41:25.878330 1434 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:41:25.878449 kubelet[1434]: I0212 19:41:25.878435 1434 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:41:25.879559 kubelet[1434]: E0212 19:41:25.879442 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd45a8d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 164.92.111.11 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876259469, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876259469, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.881541 kubelet[1434]: E0212 19:41:25.881432 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd47fa1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 164.92.111.11 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876268961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876268961, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.882000 audit[1447]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:25.882000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd31b1dd70 a2=0 a3=7ffd31b1dd5c items=0 ppid=1434 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:41:25.884000 audit[1452]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:25.884000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcf9263ee0 a2=0 a3=7ffcf9263ecc items=0 ppid=1434 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:41:25.888491 kubelet[1434]: E0212 19:41:25.884151 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd4a566", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 164.92.111.11 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876278630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876278630, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.891357 kubelet[1434]: I0212 19:41:25.891311 1434 policy_none.go:49] "None policy: Start" Feb 12 19:41:25.892833 kubelet[1434]: I0212 19:41:25.892800 1434 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:41:25.893238 kubelet[1434]: I0212 19:41:25.893221 1434 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:41:25.915688 systemd[1]: Created slice kubepods.slice. Feb 12 19:41:25.926240 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:41:25.890000 audit[1454]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:25.890000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2cc6ea40 a2=0 a3=7fff2cc6ea2c items=0 ppid=1434 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:41:25.932994 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:41:25.941000 audit[1459]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:25.941000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffefc33320 a2=0 a3=7fffefc3330c items=0 ppid=1434 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.948325 kubelet[1434]: I0212 19:41:25.948292 1434 kubelet_node_status.go:70] "Attempting to register node" node="164.92.111.11" Feb 12 19:41:25.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:41:25.951755 kubelet[1434]: E0212 19:41:25.951478 1434 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="164.92.111.11" Feb 12 19:41:25.952031 kubelet[1434]: E0212 19:41:25.951916 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd45a8d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 164.92.111.11 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876259469, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 948226809, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd45a8d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.951000 audit[1434]: AVC avc: denied { mac_admin } for pid=1434 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:25.951000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:41:25.951000 audit[1434]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e24b10 a1=c000c7ed50 a2=c000e24ae0 a3=25 items=0 ppid=1 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:25.951000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:41:25.953130 kubelet[1434]: I0212 19:41:25.952598 1434 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:41:25.953130 kubelet[1434]: I0212 19:41:25.952703 1434 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:41:25.953130 kubelet[1434]: I0212 19:41:25.952970 1434 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:41:25.957468 kubelet[1434]: E0212 19:41:25.957360 1434 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"164.92.111.11\" not found" Feb 12 19:41:25.959639 kubelet[1434]: E0212 19:41:25.959152 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd47fa1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 164.92.111.11 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876268961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 948235703, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd47fa1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.963611 kubelet[1434]: E0212 19:41:25.963460 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd4a566", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 164.92.111.11 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876278630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 948240310, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd4a566" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:25.965969 kubelet[1434]: E0212 19:41:25.965856 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef44ceb7fd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 959776253, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 959776253, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.032279 kubelet[1434]: E0212 19:41:26.031849 1434 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"164.92.111.11\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:41:26.053000 audit[1464]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:26.053000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff02913ce0 a2=0 a3=7fff02913ccc items=0 ppid=1434 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:41:26.055314 kubelet[1434]: I0212 19:41:26.055262 1434 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:41:26.056000 audit[1465]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:26.056000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcb3c3cb0 a2=0 a3=7ffdcb3c3c9c items=0 ppid=1434 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:41:26.057960 kubelet[1434]: I0212 19:41:26.057925 1434 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:41:26.058192 kubelet[1434]: I0212 19:41:26.058166 1434 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:41:26.058562 kubelet[1434]: I0212 19:41:26.058541 1434 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:41:26.058819 kubelet[1434]: E0212 19:41:26.058799 1434 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:41:26.059000 audit[1467]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:26.059000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf27a8480 a2=0 a3=7ffdf27a846c items=0 ppid=1434 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:41:26.061598 kubelet[1434]: W0212 19:41:26.061567 1434 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:41:26.061801 kubelet[1434]: E0212 19:41:26.061772 1434 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:41:26.062000 audit[1466]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:26.062000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf6ebe570 a2=0 a3=7ffcf6ebe55c items=0 ppid=1434 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:41:26.063000 audit[1468]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:26.063000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec6015130 a2=0 a3=7ffec601511c items=0 ppid=1434 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:41:26.065000 audit[1470]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:26.065000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea3db1810 a2=0 a3=7ffea3db17fc items=0 ppid=1434 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:41:26.066000 audit[1469]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:26.066000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa3c6d7f0 a2=0 a3=10e3 items=0 ppid=1434 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:41:26.068000 audit[1471]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:26.068000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2554f330 a2=0 a3=7ffe2554f31c items=0 ppid=1434 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:26.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:41:26.153279 kubelet[1434]: I0212 19:41:26.153239 1434 kubelet_node_status.go:70] "Attempting to register node" node="164.92.111.11" Feb 12 19:41:26.155741 kubelet[1434]: E0212 19:41:26.155615 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd45a8d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 164.92.111.11 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876259469, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 153181850, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd45a8d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.156414 kubelet[1434]: E0212 19:41:26.156214 1434 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="164.92.111.11" Feb 12 19:41:26.158519 kubelet[1434]: E0212 19:41:26.158400 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd47fa1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 164.92.111.11 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876268961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 153190021, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd47fa1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.166183 kubelet[1434]: E0212 19:41:26.166016 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd4a566", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 164.92.111.11 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876278630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 153197290, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd4a566" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.434232 kubelet[1434]: E0212 19:41:26.434086 1434 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"164.92.111.11\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:41:26.558317 kubelet[1434]: I0212 19:41:26.558277 1434 kubelet_node_status.go:70] "Attempting to register node" node="164.92.111.11" Feb 12 19:41:26.560520 kubelet[1434]: E0212 19:41:26.560473 1434 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="164.92.111.11" Feb 12 19:41:26.560766 kubelet[1434]: E0212 19:41:26.560418 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd45a8d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 164.92.111.11 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876259469, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 558204438, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd45a8d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.563130 kubelet[1434]: E0212 19:41:26.562896 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd47fa1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 164.92.111.11 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876268961, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 558225062, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd47fa1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.566011 kubelet[1434]: E0212 19:41:26.565852 1434 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11.17b334ef3fd4a566", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"164.92.111.11", UID:"164.92.111.11", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 164.92.111.11 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"164.92.111.11"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 41, 25, 876278630, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 41, 26, 558234263, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "164.92.111.11.17b334ef3fd4a566" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:41:26.767084 kubelet[1434]: I0212 19:41:26.762551 1434 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:41:26.786352 kubelet[1434]: E0212 19:41:26.786293 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:27.191188 kubelet[1434]: E0212 19:41:27.190823 1434 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "164.92.111.11" not found Feb 12 19:41:27.242489 kubelet[1434]: E0212 19:41:27.242372 1434 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"164.92.111.11\" not found" node="164.92.111.11" Feb 12 19:41:27.363390 kubelet[1434]: I0212 19:41:27.363333 1434 kubelet_node_status.go:70] "Attempting to register node" node="164.92.111.11" Feb 12 19:41:27.368820 kubelet[1434]: I0212 19:41:27.368764 1434 kubelet_node_status.go:73] "Successfully registered node" node="164.92.111.11" Feb 12 19:41:27.487394 kubelet[1434]: I0212 19:41:27.487252 1434 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:41:27.488780 env[1109]: time="2024-02-12T19:41:27.488676794Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:41:27.489388 kubelet[1434]: I0212 19:41:27.489320 1434 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:41:27.624193 kernel: kauditd_printk_skb: 410 callbacks suppressed Feb 12 19:41:27.624358 kernel: audit: type=1106 audit(1707766887.617:560): pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.617000 audit[1247]: USER_END pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.618284 sudo[1247]: pam_unix(sudo:session): session closed for user root Feb 12 19:41:27.622000 audit[1247]: CRED_DISP pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.632146 kernel: audit: type=1104 audit(1707766887.622:561): pid=1247 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.630372 sshd[1244]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:27.632000 audit[1244]: USER_END pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.639099 kernel: audit: type=1106 audit(1707766887.632:562): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.639214 systemd[1]: sshd@6-164.92.111.11:22-139.178.68.195:41798.service: Deactivated successfully. Feb 12 19:41:27.640373 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:41:27.632000 audit[1244]: CRED_DISP pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.646361 systemd-logind[1100]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:41:27.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.111.11:22-139.178.68.195:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.650859 kernel: audit: type=1104 audit(1707766887.632:563): pid=1244 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.651342 kernel: audit: type=1131 audit(1707766887.638:564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.111.11:22-139.178.68.195:41798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.652120 systemd-logind[1100]: Removed session 7. Feb 12 19:41:27.783492 kubelet[1434]: I0212 19:41:27.783327 1434 apiserver.go:52] "Watching apiserver" Feb 12 19:41:27.786593 kubelet[1434]: E0212 19:41:27.786536 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:27.790274 kubelet[1434]: I0212 19:41:27.790213 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:27.790717 kubelet[1434]: I0212 19:41:27.790683 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:27.791200 kubelet[1434]: I0212 19:41:27.791171 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:27.793489 kubelet[1434]: E0212 19:41:27.793400 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:27.802451 systemd[1]: Created slice kubepods-besteffort-podb7b0c210_bd55_4773_a70c_c35afbfe2319.slice. Feb 12 19:41:27.823746 systemd[1]: Created slice kubepods-besteffort-pod33d6d561_791d_4126_b610_876115923fc0.slice. Feb 12 19:41:27.829536 kubelet[1434]: I0212 19:41:27.829470 1434 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:41:27.844060 kubelet[1434]: I0212 19:41:27.843981 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsz7p\" (UniqueName: \"kubernetes.io/projected/7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c-kube-api-access-zsz7p\") pod \"csi-node-driver-7tfc6\" (UID: \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\") " pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:27.844060 kubelet[1434]: I0212 19:41:27.844066 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/33d6d561-791d-4126-b610-876115923fc0-lib-modules\") pod \"kube-proxy-kkfz6\" (UID: \"33d6d561-791d-4126-b610-876115923fc0\") " pod="kube-system/kube-proxy-kkfz6" Feb 12 19:41:27.844322 kubelet[1434]: I0212 19:41:27.844104 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-flexvol-driver-host\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844322 kubelet[1434]: I0212 19:41:27.844146 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kgkr9\" (UniqueName: \"kubernetes.io/projected/b7b0c210-bd55-4773-a70c-c35afbfe2319-kube-api-access-kgkr9\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844322 kubelet[1434]: I0212 19:41:27.844180 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c-socket-dir\") pod \"csi-node-driver-7tfc6\" (UID: \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\") " pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:27.844322 kubelet[1434]: I0212 19:41:27.844209 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c-registration-dir\") pod \"csi-node-driver-7tfc6\" (UID: \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\") " pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:27.844322 kubelet[1434]: I0212 19:41:27.844238 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4cw8p\" (UniqueName: \"kubernetes.io/projected/33d6d561-791d-4126-b610-876115923fc0-kube-api-access-4cw8p\") pod \"kube-proxy-kkfz6\" (UID: \"33d6d561-791d-4126-b610-876115923fc0\") " pod="kube-system/kube-proxy-kkfz6" Feb 12 19:41:27.844647 kubelet[1434]: I0212 19:41:27.844269 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b7b0c210-bd55-4773-a70c-c35afbfe2319-node-certs\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844647 kubelet[1434]: I0212 19:41:27.844304 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-var-run-calico\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844647 kubelet[1434]: I0212 19:41:27.844352 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-cni-log-dir\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844647 kubelet[1434]: I0212 19:41:27.844386 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c-varrun\") pod \"csi-node-driver-7tfc6\" (UID: \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\") " pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:27.844647 kubelet[1434]: I0212 19:41:27.844433 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/33d6d561-791d-4126-b610-876115923fc0-xtables-lock\") pod \"kube-proxy-kkfz6\" (UID: \"33d6d561-791d-4126-b610-876115923fc0\") " pod="kube-system/kube-proxy-kkfz6" Feb 12 19:41:27.844864 kubelet[1434]: I0212 19:41:27.844469 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-cni-net-dir\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844864 kubelet[1434]: I0212 19:41:27.844504 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-lib-modules\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844864 kubelet[1434]: I0212 19:41:27.844550 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b7b0c210-bd55-4773-a70c-c35afbfe2319-tigera-ca-bundle\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844864 kubelet[1434]: I0212 19:41:27.844599 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-xtables-lock\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.844864 kubelet[1434]: I0212 19:41:27.844637 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-policysync\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.845242 kubelet[1434]: I0212 19:41:27.844684 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-var-lib-calico\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.845242 kubelet[1434]: I0212 19:41:27.844719 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b7b0c210-bd55-4773-a70c-c35afbfe2319-cni-bin-dir\") pod \"calico-node-nr58c\" (UID: \"b7b0c210-bd55-4773-a70c-c35afbfe2319\") " pod="calico-system/calico-node-nr58c" Feb 12 19:41:27.845242 kubelet[1434]: I0212 19:41:27.844757 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c-kubelet-dir\") pod \"csi-node-driver-7tfc6\" (UID: \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\") " pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:27.845242 kubelet[1434]: I0212 19:41:27.844794 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/33d6d561-791d-4126-b610-876115923fc0-kube-proxy\") pod \"kube-proxy-kkfz6\" (UID: \"33d6d561-791d-4126-b610-876115923fc0\") " pod="kube-system/kube-proxy-kkfz6" Feb 12 19:41:27.845242 kubelet[1434]: I0212 19:41:27.844809 1434 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:41:27.962848 kubelet[1434]: E0212 19:41:27.962810 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:27.962848 kubelet[1434]: W0212 19:41:27.962838 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:27.963272 kubelet[1434]: E0212 19:41:27.962887 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:27.981464 kubelet[1434]: E0212 19:41:27.981423 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:27.981464 kubelet[1434]: W0212 19:41:27.981455 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:27.981464 kubelet[1434]: E0212 19:41:27.981490 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:27.991894 kubelet[1434]: E0212 19:41:27.991811 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:27.991894 kubelet[1434]: W0212 19:41:27.991855 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:27.991894 kubelet[1434]: E0212 19:41:27.991890 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:28.003224 kubelet[1434]: E0212 19:41:28.003190 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:28.003515 kubelet[1434]: W0212 19:41:28.003486 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:28.003715 kubelet[1434]: E0212 19:41:28.003692 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:28.120567 kubelet[1434]: E0212 19:41:28.119906 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:28.124532 env[1109]: time="2024-02-12T19:41:28.124452989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nr58c,Uid:b7b0c210-bd55-4773-a70c-c35afbfe2319,Namespace:calico-system,Attempt:0,}" Feb 12 19:41:28.136345 kubelet[1434]: E0212 19:41:28.136306 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:28.143933 env[1109]: time="2024-02-12T19:41:28.143688580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kkfz6,Uid:33d6d561-791d-4126-b610-876115923fc0,Namespace:kube-system,Attempt:0,}" Feb 12 19:41:28.798209 kubelet[1434]: E0212 19:41:28.791383 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:29.038532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2671539597.mount: Deactivated successfully. Feb 12 19:41:29.060356 kubelet[1434]: E0212 19:41:29.059591 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:29.062846 env[1109]: time="2024-02-12T19:41:29.062757258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.066214 env[1109]: time="2024-02-12T19:41:29.066163656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.080561 env[1109]: time="2024-02-12T19:41:29.080452216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.084649 env[1109]: time="2024-02-12T19:41:29.084556944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.087291 env[1109]: time="2024-02-12T19:41:29.087189835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.090167 env[1109]: time="2024-02-12T19:41:29.090038215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.095869 env[1109]: time="2024-02-12T19:41:29.095629699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.097687 env[1109]: time="2024-02-12T19:41:29.097608315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:29.160124 env[1109]: time="2024-02-12T19:41:29.159948179Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:29.160124 env[1109]: time="2024-02-12T19:41:29.159990755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:29.160124 env[1109]: time="2024-02-12T19:41:29.160002255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:29.160637 env[1109]: time="2024-02-12T19:41:29.160561726Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299 pid=1494 runtime=io.containerd.runc.v2 Feb 12 19:41:29.169950 env[1109]: time="2024-02-12T19:41:29.169836531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:29.169950 env[1109]: time="2024-02-12T19:41:29.169881652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:29.169950 env[1109]: time="2024-02-12T19:41:29.169897322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:29.170558 env[1109]: time="2024-02-12T19:41:29.170484442Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7172b6d110e7b167224a40122bf7bb3a900c5555472ca35ad941b5e3a1eedc58 pid=1496 runtime=io.containerd.runc.v2 Feb 12 19:41:29.195864 systemd[1]: Started cri-containerd-d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299.scope. Feb 12 19:41:29.210120 systemd[1]: Started cri-containerd-7172b6d110e7b167224a40122bf7bb3a900c5555472ca35ad941b5e3a1eedc58.scope. Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238198 kernel: audit: type=1400 audit(1707766889.230:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238386 kernel: audit: type=1400 audit(1707766889.230:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.247195 kernel: audit: type=1400 audit(1707766889.230:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.247380 kernel: audit: type=1400 audit(1707766889.230:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.250596 kernel: audit: type=1400 audit(1707766889.230:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.230000 audit: BPF prog-id=64 op=LOAD Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1494 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643963663639326166343530363631376631353938643130316664 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1494 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643963663639326166343530363631376631353938643130316664 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.237000 audit: BPF prog-id=65 op=LOAD Feb 12 19:41:29.237000 audit[1510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000335b20 items=0 ppid=1494 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643963663639326166343530363631376631353938643130316664 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit: BPF prog-id=66 op=LOAD Feb 12 19:41:29.238000 audit[1510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000335b68 items=0 ppid=1494 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643963663639326166343530363631376631353938643130316664 Feb 12 19:41:29.238000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:41:29.238000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { perfmon } for pid=1510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit[1510]: AVC avc: denied { bpf } for pid=1510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.238000 audit: BPF prog-id=67 op=LOAD Feb 12 19:41:29.238000 audit[1510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000335f78 items=0 ppid=1494 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438643963663639326166343530363631376631353938643130316664 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.257000 audit: BPF prog-id=68 op=LOAD Feb 12 19:41:29.259000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.259000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1496 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373262366431313065376231363732323461343031323262663762 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1496 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373262366431313065376231363732323461343031323262663762 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.260000 audit: BPF prog-id=69 op=LOAD Feb 12 19:41:29.260000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037f280 items=0 ppid=1496 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373262366431313065376231363732323461343031323262663762 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.264000 audit: BPF prog-id=70 op=LOAD Feb 12 19:41:29.264000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037f2c8 items=0 ppid=1496 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373262366431313065376231363732323461343031323262663762 Feb 12 19:41:29.266000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:41:29.267000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:29.267000 audit: BPF prog-id=71 op=LOAD Feb 12 19:41:29.267000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037f6d8 items=0 ppid=1496 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:29.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373262366431313065376231363732323461343031323262663762 Feb 12 19:41:29.307971 env[1109]: time="2024-02-12T19:41:29.307911269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kkfz6,Uid:33d6d561-791d-4126-b610-876115923fc0,Namespace:kube-system,Attempt:0,} returns sandbox id \"7172b6d110e7b167224a40122bf7bb3a900c5555472ca35ad941b5e3a1eedc58\"" Feb 12 19:41:29.308465 env[1109]: time="2024-02-12T19:41:29.308304481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nr58c,Uid:b7b0c210-bd55-4773-a70c-c35afbfe2319,Namespace:calico-system,Attempt:0,} returns sandbox id \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\"" Feb 12 19:41:29.310837 kubelet[1434]: E0212 19:41:29.310699 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:29.313622 kubelet[1434]: E0212 19:41:29.312859 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:29.316790 env[1109]: time="2024-02-12T19:41:29.316728216Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:41:29.798466 kubelet[1434]: E0212 19:41:29.798282 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:30.799250 kubelet[1434]: E0212 19:41:30.799168 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:31.053289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4235772216.mount: Deactivated successfully. Feb 12 19:41:31.059832 kubelet[1434]: E0212 19:41:31.059763 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:31.800163 kubelet[1434]: E0212 19:41:31.800106 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:32.049752 env[1109]: time="2024-02-12T19:41:32.049595846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:32.053987 env[1109]: time="2024-02-12T19:41:32.053776676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:32.059077 env[1109]: time="2024-02-12T19:41:32.057975297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:32.062430 env[1109]: time="2024-02-12T19:41:32.062375683Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:32.063063 env[1109]: time="2024-02-12T19:41:32.062839758Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 19:41:32.065960 env[1109]: time="2024-02-12T19:41:32.065876758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:41:32.068415 env[1109]: time="2024-02-12T19:41:32.068351115Z" level=info msg="CreateContainer within sandbox \"7172b6d110e7b167224a40122bf7bb3a900c5555472ca35ad941b5e3a1eedc58\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:41:32.095328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2496131976.mount: Deactivated successfully. Feb 12 19:41:32.105978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1859505942.mount: Deactivated successfully. Feb 12 19:41:32.120376 env[1109]: time="2024-02-12T19:41:32.120293866Z" level=info msg="CreateContainer within sandbox \"7172b6d110e7b167224a40122bf7bb3a900c5555472ca35ad941b5e3a1eedc58\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"aa77734256634d536d4b6ea8c8c47b5d88e5ce7672dd6e3fca45eff83626766b\"" Feb 12 19:41:32.122161 env[1109]: time="2024-02-12T19:41:32.122108851Z" level=info msg="StartContainer for \"aa77734256634d536d4b6ea8c8c47b5d88e5ce7672dd6e3fca45eff83626766b\"" Feb 12 19:41:32.169605 systemd[1]: Started cri-containerd-aa77734256634d536d4b6ea8c8c47b5d88e5ce7672dd6e3fca45eff83626766b.scope. Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1496 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373737333432353636333464353336643462366561386338633437 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit: BPF prog-id=72 op=LOAD Feb 12 19:41:32.217000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003805e0 items=0 ppid=1496 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373737333432353636333464353336643462366561386338633437 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.217000 audit: BPF prog-id=73 op=LOAD Feb 12 19:41:32.217000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000380628 items=0 ppid=1496 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373737333432353636333464353336643462366561386338633437 Feb 12 19:41:32.218000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:41:32.218000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:32.218000 audit: BPF prog-id=74 op=LOAD Feb 12 19:41:32.218000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003806b8 items=0 ppid=1496 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373737333432353636333464353336643462366561386338633437 Feb 12 19:41:32.270976 env[1109]: time="2024-02-12T19:41:32.263537077Z" level=info msg="StartContainer for \"aa77734256634d536d4b6ea8c8c47b5d88e5ce7672dd6e3fca45eff83626766b\" returns successfully" Feb 12 19:41:32.417000 audit[1621]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.417000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc21f7c430 a2=0 a3=7ffc21f7c41c items=0 ppid=1582 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:41:32.418000 audit[1619]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.418000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8c086700 a2=0 a3=7fff8c0866ec items=0 ppid=1582 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:41:32.422000 audit[1623]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.422000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc951fe040 a2=0 a3=7ffc951fe02c items=0 ppid=1582 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:41:32.424000 audit[1624]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.424000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5839e4b0 a2=0 a3=7ffe5839e49c items=0 ppid=1582 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:41:32.426000 audit[1625]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.426000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe612649a0 a2=0 a3=7ffe6126498c items=0 ppid=1582 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:41:32.428000 audit[1626]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.428000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5ef63ca0 a2=0 a3=7fff5ef63c8c items=0 ppid=1582 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:41:32.522000 audit[1627]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.522000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe07ad0450 a2=0 a3=7ffe07ad043c items=0 ppid=1582 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:41:32.528000 audit[1629]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.528000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff69632380 a2=0 a3=7fff6963236c items=0 ppid=1582 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:41:32.535000 audit[1632]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.535000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce80338b0 a2=0 a3=7ffce803389c items=0 ppid=1582 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:41:32.538000 audit[1633]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.538000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf3559c80 a2=0 a3=7ffdf3559c6c items=0 ppid=1582 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:41:32.544000 audit[1635]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.544000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8bf4bba0 a2=0 a3=7fff8bf4bb8c items=0 ppid=1582 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:41:32.547000 audit[1636]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.547000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe02e98700 a2=0 a3=7ffe02e986ec items=0 ppid=1582 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:41:32.554000 audit[1638]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.554000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5718c610 a2=0 a3=7ffd5718c5fc items=0 ppid=1582 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:41:32.567000 audit[1641]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1641 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.567000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8873e7a0 a2=0 a3=7ffc8873e78c items=0 ppid=1582 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:41:32.569000 audit[1642]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.569000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe280292f0 a2=0 a3=7ffe280292dc items=0 ppid=1582 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:41:32.575000 audit[1644]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.575000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb2bcc7c0 a2=0 a3=7ffeb2bcc7ac items=0 ppid=1582 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:41:32.578000 audit[1645]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.578000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea8dca350 a2=0 a3=7ffea8dca33c items=0 ppid=1582 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:41:32.584000 audit[1647]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.584000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe83900750 a2=0 a3=7ffe8390073c items=0 ppid=1582 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:41:32.599000 audit[1650]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.599000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc50ad2e80 a2=0 a3=7ffc50ad2e6c items=0 ppid=1582 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:41:32.608000 audit[1653]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.608000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc69377460 a2=0 a3=7ffc6937744c items=0 ppid=1582 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:41:32.610000 audit[1654]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.610000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce6153c90 a2=0 a3=7ffce6153c7c items=0 ppid=1582 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:41:32.652129 kernel: kauditd_printk_skb: 215 callbacks suppressed Feb 12 19:41:32.652375 kernel: audit: type=1325 audit(1707766892.615:628): table=nat:35 family=2 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.615000 audit[1656]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.657306 kernel: audit: type=1300 audit(1707766892.615:628): arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7fe1a360 a2=0 a3=7fff7fe1a34c items=0 ppid=1582 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.615000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7fe1a360 a2=0 a3=7fff7fe1a34c items=0 ppid=1582 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.661046 kernel: audit: type=1327 audit(1707766892.615:628): proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.656000 audit[1661]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.664076 kernel: audit: type=1325 audit(1707766892.656:629): table=nat:36 family=2 entries=2 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.656000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff51e8c200 a2=0 a3=7fff51e8c1ec items=0 ppid=1582 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.670102 kernel: audit: type=1300 audit(1707766892.656:629): arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff51e8c200 a2=0 a3=7fff51e8c1ec items=0 ppid=1582 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.677098 kernel: audit: type=1327 audit(1707766892.656:629): proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.671000 audit[1666]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.680067 kernel: audit: type=1325 audit(1707766892.671:630): table=nat:37 family=2 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.671000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf6d44540 a2=0 a3=7ffdf6d4452c items=0 ppid=1582 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.685073 kernel: audit: type=1300 audit(1707766892.671:630): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf6d44540 a2=0 a3=7ffdf6d4452c items=0 ppid=1582 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:41:32.690481 kernel: audit: type=1327 audit(1707766892.671:630): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:41:32.690693 kernel: audit: type=1325 audit(1707766892.676:631): table=nat:38 family=2 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.676000 audit[1668]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:41:32.676000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff46586aa0 a2=0 a3=7fff46586a8c items=0 ppid=1582 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:41:32.705000 audit[1670]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:32.705000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3b15bd40 a2=0 a3=7ffc3b15bd2c items=0 ppid=1582 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:32.742000 audit[1670]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:32.742000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc3b15bd40 a2=0 a3=7ffc3b15bd2c items=0 ppid=1582 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:32.760000 audit[1679]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.760000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8c26c6e0 a2=0 a3=7ffc8c26c6cc items=0 ppid=1582 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:41:32.766000 audit[1681]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.766000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcfbf0a30 a2=0 a3=7fffcfbf0a1c items=0 ppid=1582 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.766000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:41:32.775000 audit[1684]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.775000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffe3067fb0 a2=0 a3=7fffe3067f9c items=0 ppid=1582 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:41:32.779000 audit[1685]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.779000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc427b3250 a2=0 a3=7ffc427b323c items=0 ppid=1582 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:41:32.787000 audit[1687]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.787000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2eee75a0 a2=0 a3=7fff2eee758c items=0 ppid=1582 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:41:32.795000 audit[1688]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.795000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd05a316a0 a2=0 a3=7ffd05a3168c items=0 ppid=1582 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:41:32.801742 kubelet[1434]: E0212 19:41:32.801665 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:32.802000 audit[1690]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.802000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb1cac620 a2=0 a3=7ffdb1cac60c items=0 ppid=1582 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:41:32.816000 audit[1693]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.816000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffce7056790 a2=0 a3=7ffce705677c items=0 ppid=1582 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:41:32.818000 audit[1694]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.818000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd53e750e0 a2=0 a3=7ffd53e750cc items=0 ppid=1582 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:41:32.827000 audit[1696]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.827000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeccebb000 a2=0 a3=7ffeccebafec items=0 ppid=1582 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:41:32.833000 audit[1697]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.833000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe495ca530 a2=0 a3=7ffe495ca51c items=0 ppid=1582 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:41:32.839000 audit[1699]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.839000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2c590880 a2=0 a3=7ffd2c59086c items=0 ppid=1582 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:41:32.846000 audit[1702]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.846000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc77e2720 a2=0 a3=7ffdc77e270c items=0 ppid=1582 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:41:32.854000 audit[1705]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.854000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc62fe5310 a2=0 a3=7ffc62fe52fc items=0 ppid=1582 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:41:32.857000 audit[1706]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.857000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb3396640 a2=0 a3=7ffeb339662c items=0 ppid=1582 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:41:32.863000 audit[1708]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.863000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcddba2c10 a2=0 a3=7ffcddba2bfc items=0 ppid=1582 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.870000 audit[1711]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.870000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff3035fa60 a2=0 a3=7fff3035fa4c items=0 ppid=1582 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:41:32.872000 audit[1712]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.872000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3e3c9bc0 a2=0 a3=7ffe3e3c9bac items=0 ppid=1582 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:41:32.877000 audit[1714]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.877000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffecabb1060 a2=0 a3=7ffecabb104c items=0 ppid=1582 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:41:32.884000 audit[1717]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.884000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1501aee0 a2=0 a3=7ffc1501aecc items=0 ppid=1582 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:41:32.887000 audit[1718]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.887000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc49680f80 a2=0 a3=7ffc49680f6c items=0 ppid=1582 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:41:32.892000 audit[1720]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:41:32.892000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe5d1b5790 a2=0 a3=7ffe5d1b577c items=0 ppid=1582 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.892000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:41:32.902000 audit[1722]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:41:32.902000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff7a3ff890 a2=0 a3=7fff7a3ff87c items=0 ppid=1582 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.902000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:32.904000 audit[1722]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:41:32.904000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff7a3ff890 a2=0 a3=7fff7a3ff87c items=0 ppid=1582 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:32.904000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:33.060203 kubelet[1434]: E0212 19:41:33.059877 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:33.109545 kubelet[1434]: E0212 19:41:33.109507 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:33.124572 kubelet[1434]: I0212 19:41:33.124513 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kkfz6" podStartSLOduration=3.376155825 podCreationTimestamp="2024-02-12 19:41:27 +0000 UTC" firstStartedPulling="2024-02-12 19:41:29.315380877 +0000 UTC m=+4.216841472" lastFinishedPulling="2024-02-12 19:41:32.063654987 +0000 UTC m=+6.965115590" observedRunningTime="2024-02-12 19:41:33.12388845 +0000 UTC m=+8.025349062" watchObservedRunningTime="2024-02-12 19:41:33.124429943 +0000 UTC m=+8.025890556" Feb 12 19:41:33.182966 kubelet[1434]: E0212 19:41:33.182669 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.182966 kubelet[1434]: W0212 19:41:33.182706 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.182966 kubelet[1434]: E0212 19:41:33.182741 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.183352 kubelet[1434]: E0212 19:41:33.183308 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.183352 kubelet[1434]: W0212 19:41:33.183329 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.183511 kubelet[1434]: E0212 19:41:33.183366 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.183696 kubelet[1434]: E0212 19:41:33.183672 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.183696 kubelet[1434]: W0212 19:41:33.183694 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.183996 kubelet[1434]: E0212 19:41:33.183717 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.184146 kubelet[1434]: E0212 19:41:33.184122 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.184146 kubelet[1434]: W0212 19:41:33.184143 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.184293 kubelet[1434]: E0212 19:41:33.184166 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.184463 kubelet[1434]: E0212 19:41:33.184443 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.184537 kubelet[1434]: W0212 19:41:33.184462 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.184537 kubelet[1434]: E0212 19:41:33.184484 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.184773 kubelet[1434]: E0212 19:41:33.184743 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.184773 kubelet[1434]: W0212 19:41:33.184760 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.184915 kubelet[1434]: E0212 19:41:33.184780 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.185142 kubelet[1434]: E0212 19:41:33.185121 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.185142 kubelet[1434]: W0212 19:41:33.185140 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.185281 kubelet[1434]: E0212 19:41:33.185161 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.185450 kubelet[1434]: E0212 19:41:33.185430 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.185524 kubelet[1434]: W0212 19:41:33.185449 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.185524 kubelet[1434]: E0212 19:41:33.185470 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.185767 kubelet[1434]: E0212 19:41:33.185749 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.185840 kubelet[1434]: W0212 19:41:33.185767 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.185840 kubelet[1434]: E0212 19:41:33.185787 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.186498 kubelet[1434]: E0212 19:41:33.186422 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.186635 kubelet[1434]: W0212 19:41:33.186533 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.186635 kubelet[1434]: E0212 19:41:33.186578 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.187307 kubelet[1434]: E0212 19:41:33.187127 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.187307 kubelet[1434]: W0212 19:41:33.187149 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.187307 kubelet[1434]: E0212 19:41:33.187173 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.187463 kubelet[1434]: E0212 19:41:33.187441 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.187463 kubelet[1434]: W0212 19:41:33.187455 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.187566 kubelet[1434]: E0212 19:41:33.187476 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.187784 kubelet[1434]: E0212 19:41:33.187764 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.187784 kubelet[1434]: W0212 19:41:33.187781 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.187916 kubelet[1434]: E0212 19:41:33.187799 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.188176 kubelet[1434]: E0212 19:41:33.188129 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.188176 kubelet[1434]: W0212 19:41:33.188149 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.188176 kubelet[1434]: E0212 19:41:33.188170 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.188450 kubelet[1434]: E0212 19:41:33.188432 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.188450 kubelet[1434]: W0212 19:41:33.188449 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.188557 kubelet[1434]: E0212 19:41:33.188467 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.188748 kubelet[1434]: E0212 19:41:33.188730 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.188748 kubelet[1434]: W0212 19:41:33.188747 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.188864 kubelet[1434]: E0212 19:41:33.188767 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.196560 kubelet[1434]: E0212 19:41:33.196518 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.196788 kubelet[1434]: W0212 19:41:33.196763 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.196913 kubelet[1434]: E0212 19:41:33.196895 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.207997 kubelet[1434]: E0212 19:41:33.207961 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.209081 kubelet[1434]: W0212 19:41:33.209025 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.209337 kubelet[1434]: E0212 19:41:33.209320 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.210074 kubelet[1434]: E0212 19:41:33.210027 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.210223 kubelet[1434]: W0212 19:41:33.210203 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.210385 kubelet[1434]: E0212 19:41:33.210354 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.211001 kubelet[1434]: E0212 19:41:33.210972 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.211142 kubelet[1434]: W0212 19:41:33.211093 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.211142 kubelet[1434]: E0212 19:41:33.211135 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.211527 kubelet[1434]: E0212 19:41:33.211474 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.211527 kubelet[1434]: W0212 19:41:33.211504 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.211527 kubelet[1434]: E0212 19:41:33.211531 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.211829 kubelet[1434]: E0212 19:41:33.211808 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.211829 kubelet[1434]: W0212 19:41:33.211825 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.212000 kubelet[1434]: E0212 19:41:33.211959 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.212216 kubelet[1434]: E0212 19:41:33.212196 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.212216 kubelet[1434]: W0212 19:41:33.212211 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.212419 kubelet[1434]: E0212 19:41:33.212280 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.212584 kubelet[1434]: E0212 19:41:33.212551 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.212584 kubelet[1434]: W0212 19:41:33.212568 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.212749 kubelet[1434]: E0212 19:41:33.212592 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.212906 kubelet[1434]: E0212 19:41:33.212887 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.212906 kubelet[1434]: W0212 19:41:33.212903 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.213019 kubelet[1434]: E0212 19:41:33.212926 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.213572 kubelet[1434]: E0212 19:41:33.213546 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.213572 kubelet[1434]: W0212 19:41:33.213566 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.213818 kubelet[1434]: E0212 19:41:33.213788 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.213977 kubelet[1434]: E0212 19:41:33.213851 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.214142 kubelet[1434]: W0212 19:41:33.214120 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.214251 kubelet[1434]: E0212 19:41:33.214235 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.215151 kubelet[1434]: E0212 19:41:33.215123 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:33.215294 kubelet[1434]: W0212 19:41:33.215271 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:33.215533 kubelet[1434]: E0212 19:41:33.215475 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:33.704868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2018326379.mount: Deactivated successfully. Feb 12 19:41:33.802462 kubelet[1434]: E0212 19:41:33.802382 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:34.111426 kubelet[1434]: E0212 19:41:34.111283 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:34.199830 kubelet[1434]: E0212 19:41:34.199769 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.199830 kubelet[1434]: W0212 19:41:34.199809 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.199830 kubelet[1434]: E0212 19:41:34.199840 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.200370 kubelet[1434]: E0212 19:41:34.200345 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.200370 kubelet[1434]: W0212 19:41:34.200365 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.200559 kubelet[1434]: E0212 19:41:34.200394 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.200637 kubelet[1434]: E0212 19:41:34.200624 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.200637 kubelet[1434]: W0212 19:41:34.200635 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.200804 kubelet[1434]: E0212 19:41:34.200661 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.200947 kubelet[1434]: E0212 19:41:34.200914 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.200947 kubelet[1434]: W0212 19:41:34.200927 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.201091 kubelet[1434]: E0212 19:41:34.200960 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.201240 kubelet[1434]: E0212 19:41:34.201223 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.201240 kubelet[1434]: W0212 19:41:34.201239 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.201381 kubelet[1434]: E0212 19:41:34.201255 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.201529 kubelet[1434]: E0212 19:41:34.201513 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.201529 kubelet[1434]: W0212 19:41:34.201527 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.201648 kubelet[1434]: E0212 19:41:34.201547 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.201923 kubelet[1434]: E0212 19:41:34.201857 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.201923 kubelet[1434]: W0212 19:41:34.201871 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.201923 kubelet[1434]: E0212 19:41:34.201887 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.202153 kubelet[1434]: E0212 19:41:34.202120 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.202153 kubelet[1434]: W0212 19:41:34.202130 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.202244 kubelet[1434]: E0212 19:41:34.202182 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.202420 kubelet[1434]: E0212 19:41:34.202404 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.202420 kubelet[1434]: W0212 19:41:34.202417 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.202608 kubelet[1434]: E0212 19:41:34.202433 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.202791 kubelet[1434]: E0212 19:41:34.202762 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.202791 kubelet[1434]: W0212 19:41:34.202788 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.203163 kubelet[1434]: E0212 19:41:34.202807 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.203305 kubelet[1434]: E0212 19:41:34.203287 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.203305 kubelet[1434]: W0212 19:41:34.203302 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.203448 kubelet[1434]: E0212 19:41:34.203322 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.203619 kubelet[1434]: E0212 19:41:34.203574 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.203619 kubelet[1434]: W0212 19:41:34.203595 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.203619 kubelet[1434]: E0212 19:41:34.203615 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.203923 kubelet[1434]: E0212 19:41:34.203886 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.203923 kubelet[1434]: W0212 19:41:34.203902 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.203923 kubelet[1434]: E0212 19:41:34.203920 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.204218 kubelet[1434]: E0212 19:41:34.204200 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.204218 kubelet[1434]: W0212 19:41:34.204216 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.204747 kubelet[1434]: E0212 19:41:34.204239 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.204747 kubelet[1434]: E0212 19:41:34.204494 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.204747 kubelet[1434]: W0212 19:41:34.204507 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.204747 kubelet[1434]: E0212 19:41:34.204525 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.204997 kubelet[1434]: E0212 19:41:34.204760 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.204997 kubelet[1434]: W0212 19:41:34.204770 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.204997 kubelet[1434]: E0212 19:41:34.204786 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.220875 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.223266 kubelet[1434]: W0212 19:41:34.220912 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.220948 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.221473 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.223266 kubelet[1434]: W0212 19:41:34.221492 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.221523 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.221932 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.223266 kubelet[1434]: W0212 19:41:34.221947 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.221978 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.223266 kubelet[1434]: E0212 19:41:34.222524 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.223987 kubelet[1434]: W0212 19:41:34.222548 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.223987 kubelet[1434]: E0212 19:41:34.222635 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.223987 kubelet[1434]: E0212 19:41:34.222967 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.223987 kubelet[1434]: W0212 19:41:34.222992 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.223987 kubelet[1434]: E0212 19:41:34.223031 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.224999 kubelet[1434]: E0212 19:41:34.224754 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.224999 kubelet[1434]: W0212 19:41:34.224781 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.224999 kubelet[1434]: E0212 19:41:34.224814 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.225913 kubelet[1434]: E0212 19:41:34.225369 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.225913 kubelet[1434]: W0212 19:41:34.225387 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.225913 kubelet[1434]: E0212 19:41:34.225584 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.225913 kubelet[1434]: E0212 19:41:34.225693 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.225913 kubelet[1434]: W0212 19:41:34.225708 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.225913 kubelet[1434]: E0212 19:41:34.225742 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.226646 kubelet[1434]: E0212 19:41:34.226623 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.227514 kubelet[1434]: W0212 19:41:34.226781 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.227514 kubelet[1434]: E0212 19:41:34.226828 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.228145 kubelet[1434]: E0212 19:41:34.228019 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.228145 kubelet[1434]: W0212 19:41:34.228087 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.228269 kubelet[1434]: E0212 19:41:34.228119 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.228932 kubelet[1434]: E0212 19:41:34.228900 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.229276 kubelet[1434]: W0212 19:41:34.229255 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.229445 kubelet[1434]: E0212 19:41:34.229425 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.229737 kubelet[1434]: E0212 19:41:34.229703 1434 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:41:34.229737 kubelet[1434]: W0212 19:41:34.229731 1434 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:41:34.229850 kubelet[1434]: E0212 19:41:34.229749 1434 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:41:34.810783 kubelet[1434]: E0212 19:41:34.810285 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:34.843388 env[1109]: time="2024-02-12T19:41:34.831394410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:34.843388 env[1109]: time="2024-02-12T19:41:34.834394062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:34.843388 env[1109]: time="2024-02-12T19:41:34.838497588Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:34.857151 env[1109]: time="2024-02-12T19:41:34.847867921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:41:34.857151 env[1109]: time="2024-02-12T19:41:34.842388954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:34.865203 env[1109]: time="2024-02-12T19:41:34.861949243Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:41:34.882438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount709582839.mount: Deactivated successfully. Feb 12 19:41:34.891488 env[1109]: time="2024-02-12T19:41:34.891365143Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e\"" Feb 12 19:41:34.892346 env[1109]: time="2024-02-12T19:41:34.892310229Z" level=info msg="StartContainer for \"a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e\"" Feb 12 19:41:34.938568 systemd[1]: Started cri-containerd-a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e.scope. Feb 12 19:41:34.988000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.988000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1494 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333237343636633438626263393630656264306361336366636335 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.989000 audit: BPF prog-id=75 op=LOAD Feb 12 19:41:34.989000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001faf70 items=0 ppid=1494 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333237343636633438626263393630656264306361336366636335 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.990000 audit: BPF prog-id=76 op=LOAD Feb 12 19:41:34.990000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fafb8 items=0 ppid=1494 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333237343636633438626263393630656264306361336366636335 Feb 12 19:41:34.991000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:41:34.992000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:34.992000 audit: BPF prog-id=77 op=LOAD Feb 12 19:41:34.992000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb048 items=0 ppid=1494 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333237343636633438626263393630656264306361336366636335 Feb 12 19:41:35.028002 env[1109]: time="2024-02-12T19:41:35.027940368Z" level=info msg="StartContainer for \"a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e\" returns successfully" Feb 12 19:41:35.039252 systemd[1]: cri-containerd-a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e.scope: Deactivated successfully. Feb 12 19:41:35.041000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:41:35.059539 kubelet[1434]: E0212 19:41:35.059478 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:35.077700 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e-rootfs.mount: Deactivated successfully. Feb 12 19:41:35.119734 kubelet[1434]: E0212 19:41:35.119620 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:35.277871 env[1109]: time="2024-02-12T19:41:35.277794878Z" level=info msg="shim disconnected" id=a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e Feb 12 19:41:35.278225 env[1109]: time="2024-02-12T19:41:35.278185220Z" level=warning msg="cleaning up after shim disconnected" id=a0327466c48bbc960ebd0ca3cfcc57894959ac86e9d66228dd4e0d35979da56e namespace=k8s.io Feb 12 19:41:35.278551 env[1109]: time="2024-02-12T19:41:35.278518662Z" level=info msg="cleaning up dead shim" Feb 12 19:41:35.298146 env[1109]: time="2024-02-12T19:41:35.298083036Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:41:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1831 runtime=io.containerd.runc.v2\n" Feb 12 19:41:35.811259 kubelet[1434]: E0212 19:41:35.811183 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:36.125986 kubelet[1434]: E0212 19:41:36.125522 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:36.127775 env[1109]: time="2024-02-12T19:41:36.127430426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:41:36.811426 kubelet[1434]: E0212 19:41:36.811374 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:37.059952 kubelet[1434]: E0212 19:41:37.059861 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:37.682657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount668369235.mount: Deactivated successfully. Feb 12 19:41:37.812980 kubelet[1434]: E0212 19:41:37.812928 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:38.814277 kubelet[1434]: E0212 19:41:38.814182 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:39.060191 kubelet[1434]: E0212 19:41:39.059593 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:39.815076 kubelet[1434]: E0212 19:41:39.814998 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:40.815586 kubelet[1434]: E0212 19:41:40.815514 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:41.059682 kubelet[1434]: E0212 19:41:41.059605 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:41.816576 kubelet[1434]: E0212 19:41:41.816498 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:42.817109 kubelet[1434]: E0212 19:41:42.817016 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:43.059099 kubelet[1434]: E0212 19:41:43.059002 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:43.453097 env[1109]: time="2024-02-12T19:41:43.452978094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:43.457618 env[1109]: time="2024-02-12T19:41:43.456357057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:43.459464 env[1109]: time="2024-02-12T19:41:43.459405274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:43.463885 env[1109]: time="2024-02-12T19:41:43.463824539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:43.466672 env[1109]: time="2024-02-12T19:41:43.465747087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:41:43.471442 env[1109]: time="2024-02-12T19:41:43.471384616Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:41:43.491453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount686450891.mount: Deactivated successfully. Feb 12 19:41:43.504998 env[1109]: time="2024-02-12T19:41:43.504889907Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54\"" Feb 12 19:41:43.506485 env[1109]: time="2024-02-12T19:41:43.506405041Z" level=info msg="StartContainer for \"35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54\"" Feb 12 19:41:43.545468 systemd[1]: Started cri-containerd-35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54.scope. Feb 12 19:41:43.608391 kernel: kauditd_printk_skb: 124 callbacks suppressed Feb 12 19:41:43.608646 kernel: audit: type=1400 audit(1707766903.596:665): avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.608722 kernel: audit: type=1300 audit(1707766903.596:665): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1494 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1494 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363636373330616565656532326263336336376137373631616262 Feb 12 19:41:43.615304 kernel: audit: type=1327 audit(1707766903.596:665): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363636373330616565656532326263336336376137373631616262 Feb 12 19:41:43.615500 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.622952 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.627100 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.635423 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.635601 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.635637 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.640137 kernel: audit: type=1400 audit(1707766903.596:666): avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.596000 audit: BPF prog-id=78 op=LOAD Feb 12 19:41:43.596000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f6180 items=0 ppid=1494 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363636373330616565656532326263336336376137373631616262 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.598000 audit: BPF prog-id=79 op=LOAD Feb 12 19:41:43.598000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003f61c8 items=0 ppid=1494 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363636373330616565656532326263336336376137373631616262 Feb 12 19:41:43.601000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:41:43.601000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:43.601000 audit: BPF prog-id=80 op=LOAD Feb 12 19:41:43.601000 audit[1851]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003f6258 items=0 ppid=1494 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363636373330616565656532326263336336376137373631616262 Feb 12 19:41:43.667588 env[1109]: time="2024-02-12T19:41:43.667479167Z" level=info msg="StartContainer for \"35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54\" returns successfully" Feb 12 19:41:43.817347 kubelet[1434]: E0212 19:41:43.817211 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:44.154470 kubelet[1434]: E0212 19:41:44.154243 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:44.471147 systemd[1]: cri-containerd-35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54.scope: Deactivated successfully. Feb 12 19:41:44.475000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:41:44.481798 kubelet[1434]: I0212 19:41:44.481756 1434 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:41:44.524176 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54-rootfs.mount: Deactivated successfully. Feb 12 19:41:44.662514 env[1109]: time="2024-02-12T19:41:44.662440117Z" level=info msg="shim disconnected" id=35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54 Feb 12 19:41:44.662514 env[1109]: time="2024-02-12T19:41:44.662515547Z" level=warning msg="cleaning up after shim disconnected" id=35666730aeeee22bc3c67a7761abb698414a5b969f572b076185bc25bde53e54 namespace=k8s.io Feb 12 19:41:44.663611 env[1109]: time="2024-02-12T19:41:44.662530415Z" level=info msg="cleaning up dead shim" Feb 12 19:41:44.681393 env[1109]: time="2024-02-12T19:41:44.681321480Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:41:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1898 runtime=io.containerd.runc.v2\n" Feb 12 19:41:44.818899 kubelet[1434]: E0212 19:41:44.818573 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:45.071116 systemd[1]: Created slice kubepods-besteffort-pod7b5d9558_37d6_4b28_be3a_c2cc9bac7a8c.slice. Feb 12 19:41:45.079661 env[1109]: time="2024-02-12T19:41:45.079584188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7tfc6,Uid:7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c,Namespace:calico-system,Attempt:0,}" Feb 12 19:41:45.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.92.111.11:22-218.92.0.47:3952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.125288 systemd[1]: Started sshd@7-164.92.111.11:22-218.92.0.47:3952.service. Feb 12 19:41:45.165175 kubelet[1434]: E0212 19:41:45.164337 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:45.166713 env[1109]: time="2024-02-12T19:41:45.166623090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:41:45.238491 env[1109]: time="2024-02-12T19:41:45.238403748Z" level=error msg="Failed to destroy network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:45.241738 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7-shm.mount: Deactivated successfully. Feb 12 19:41:45.242089 env[1109]: time="2024-02-12T19:41:45.241639913Z" level=error msg="encountered an error cleaning up failed sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:45.242934 env[1109]: time="2024-02-12T19:41:45.242828607Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7tfc6,Uid:7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:45.243718 kubelet[1434]: E0212 19:41:45.243675 1434 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:45.243842 kubelet[1434]: E0212 19:41:45.243794 1434 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:45.243842 kubelet[1434]: E0212 19:41:45.243831 1434 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7tfc6" Feb 12 19:41:45.244404 kubelet[1434]: E0212 19:41:45.244364 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7tfc6_calico-system(7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7tfc6_calico-system(7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:45.298376 sshd[1920]: Unable to negotiate with 218.92.0.47 port 3952: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 12 19:41:45.299654 systemd[1]: sshd@7-164.92.111.11:22-218.92.0.47:3952.service: Deactivated successfully. Feb 12 19:41:45.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.92.111.11:22-218.92.0.47:3952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:45.780897 kubelet[1434]: E0212 19:41:45.780808 1434 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:45.819351 kubelet[1434]: E0212 19:41:45.819251 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:45.935000 audit[1950]: NETFILTER_CFG table=filter:65 family=2 entries=9 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.935000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffeacf1a690 a2=0 a3=7ffeacf1a67c items=0 ppid=1582 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.937000 audit[1950]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.937000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffeacf1a690 a2=0 a3=7ffeacf1a67c items=0 ppid=1582 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.949000 audit[1952]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.949000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdb629ede0 a2=0 a3=7ffdb629edcc items=0 ppid=1582 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.952000 audit[1952]: NETFILTER_CFG table=nat:68 family=2 entries=34 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.952000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffdb629ede0 a2=0 a3=7ffdb629edcc items=0 ppid=1582 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:46.167786 kubelet[1434]: I0212 19:41:46.167625 1434 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:41:46.170087 env[1109]: time="2024-02-12T19:41:46.170004420Z" level=info msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" Feb 12 19:41:46.222441 env[1109]: time="2024-02-12T19:41:46.222210212Z" level=error msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" failed" error="failed to destroy network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:46.223139 kubelet[1434]: E0212 19:41:46.223092 1434 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:41:46.223376 kubelet[1434]: E0212 19:41:46.223190 1434 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7} Feb 12 19:41:46.223376 kubelet[1434]: E0212 19:41:46.223232 1434 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:46.223376 kubelet[1434]: E0212 19:41:46.223262 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7tfc6" podUID=7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c Feb 12 19:41:46.820100 kubelet[1434]: E0212 19:41:46.820024 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:47.820868 kubelet[1434]: E0212 19:41:47.820810 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:48.822780 kubelet[1434]: E0212 19:41:48.822698 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:49.823503 kubelet[1434]: E0212 19:41:49.823413 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:50.824920 kubelet[1434]: E0212 19:41:50.824857 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:51.135053 kubelet[1434]: I0212 19:41:51.134083 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:51.144622 systemd[1]: Created slice kubepods-besteffort-pod9d350b63_8b01_4bea_b6ac_12a4be6f1168.slice. Feb 12 19:41:51.210318 kubelet[1434]: I0212 19:41:51.210175 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkgqv\" (UniqueName: \"kubernetes.io/projected/9d350b63-8b01-4bea-b6ac-12a4be6f1168-kube-api-access-qkgqv\") pod \"nginx-deployment-845c78c8b9-ndztm\" (UID: \"9d350b63-8b01-4bea-b6ac-12a4be6f1168\") " pod="default/nginx-deployment-845c78c8b9-ndztm" Feb 12 19:41:51.474930 env[1109]: time="2024-02-12T19:41:51.473122499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-ndztm,Uid:9d350b63-8b01-4bea-b6ac-12a4be6f1168,Namespace:default,Attempt:0,}" Feb 12 19:41:51.709993 env[1109]: time="2024-02-12T19:41:51.709907168Z" level=error msg="Failed to destroy network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:51.713085 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f-shm.mount: Deactivated successfully. Feb 12 19:41:51.715031 env[1109]: time="2024-02-12T19:41:51.714952726Z" level=error msg="encountered an error cleaning up failed sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:51.715326 env[1109]: time="2024-02-12T19:41:51.715280953Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-ndztm,Uid:9d350b63-8b01-4bea-b6ac-12a4be6f1168,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:51.715967 kubelet[1434]: E0212 19:41:51.715793 1434 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:51.715967 kubelet[1434]: E0212 19:41:51.715922 1434 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-ndztm" Feb 12 19:41:51.715967 kubelet[1434]: E0212 19:41:51.715961 1434 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-ndztm" Feb 12 19:41:51.718110 kubelet[1434]: E0212 19:41:51.716155 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-ndztm_default(9d350b63-8b01-4bea-b6ac-12a4be6f1168)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-ndztm_default(9d350b63-8b01-4bea-b6ac-12a4be6f1168)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-ndztm" podUID=9d350b63-8b01-4bea-b6ac-12a4be6f1168 Feb 12 19:41:51.826303 kubelet[1434]: E0212 19:41:51.825212 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:52.183510 kubelet[1434]: I0212 19:41:52.183456 1434 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:41:52.184567 env[1109]: time="2024-02-12T19:41:52.184511550Z" level=info msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" Feb 12 19:41:52.279407 env[1109]: time="2024-02-12T19:41:52.279332441Z" level=error msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" failed" error="failed to destroy network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:41:52.280125 kubelet[1434]: E0212 19:41:52.280076 1434 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:41:52.280449 kubelet[1434]: E0212 19:41:52.280162 1434 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f} Feb 12 19:41:52.280449 kubelet[1434]: E0212 19:41:52.280244 1434 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9d350b63-8b01-4bea-b6ac-12a4be6f1168\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:41:52.280449 kubelet[1434]: E0212 19:41:52.280316 1434 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9d350b63-8b01-4bea-b6ac-12a4be6f1168\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-ndztm" podUID=9d350b63-8b01-4bea-b6ac-12a4be6f1168 Feb 12 19:41:52.825915 kubelet[1434]: E0212 19:41:52.825841 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:53.832047 kubelet[1434]: E0212 19:41:53.826211 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:53.846931 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1821814846.mount: Deactivated successfully. Feb 12 19:41:53.982589 env[1109]: time="2024-02-12T19:41:53.982477248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:53.986901 env[1109]: time="2024-02-12T19:41:53.986830827Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:53.989796 env[1109]: time="2024-02-12T19:41:53.989730707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:53.992740 env[1109]: time="2024-02-12T19:41:53.992670968Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:53.993952 env[1109]: time="2024-02-12T19:41:53.993893540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:41:54.018686 env[1109]: time="2024-02-12T19:41:54.018627169Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:41:54.045662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3421773526.mount: Deactivated successfully. Feb 12 19:41:54.055712 env[1109]: time="2024-02-12T19:41:54.055629931Z" level=info msg="CreateContainer within sandbox \"d8d9cf692af4506617f1598d101fd087b6213e8413439b8b7a9bf4483da87299\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902\"" Feb 12 19:41:54.057527 env[1109]: time="2024-02-12T19:41:54.057473217Z" level=info msg="StartContainer for \"992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902\"" Feb 12 19:41:54.088025 systemd[1]: Started cri-containerd-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902.scope. Feb 12 19:41:54.123000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.125536 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 12 19:41:54.125660 kernel: audit: type=1400 audit(1707766914.123:678): avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.123000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1494 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:54.135573 kernel: audit: type=1300 audit(1707766914.123:678): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1494 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:54.135904 kernel: audit: type=1327 audit(1707766914.123:678): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323235326634623662336239333936383134356535386338343933 Feb 12 19:41:54.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323235326634623662336239333936383134356535386338343933 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.147176 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.147356 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.147426 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.153166 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.160135 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.169221 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.169370 kernel: audit: type=1400 audit(1707766914.124:679): avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.124000 audit: BPF prog-id=81 op=LOAD Feb 12 19:41:54.124000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003be130 items=0 ppid=1494 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:54.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323235326634623662336239333936383134356535386338343933 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.129000 audit: BPF prog-id=82 op=LOAD Feb 12 19:41:54.129000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003be178 items=0 ppid=1494 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:54.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323235326634623662336239333936383134356535386338343933 Feb 12 19:41:54.139000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:41:54.139000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { perfmon } for pid=2034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit[2034]: AVC avc: denied { bpf } for pid=2034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:54.139000 audit: BPF prog-id=83 op=LOAD Feb 12 19:41:54.139000 audit[2034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be208 items=0 ppid=1494 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:54.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323235326634623662336239333936383134356535386338343933 Feb 12 19:41:54.189148 env[1109]: time="2024-02-12T19:41:54.189027414Z" level=info msg="StartContainer for \"992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902\" returns successfully" Feb 12 19:41:54.307485 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:41:54.307703 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:41:54.832302 kubelet[1434]: E0212 19:41:54.832218 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:55.203027 kubelet[1434]: E0212 19:41:55.202941 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:55.240706 systemd[1]: run-containerd-runc-k8s.io-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902-runc.GcJhgd.mount: Deactivated successfully. Feb 12 19:41:55.832884 kubelet[1434]: E0212 19:41:55.832819 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:55.861000 audit[2161]: AVC avc: denied { write } for pid=2161 comm="tee" name="fd" dev="proc" ino=20595 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.861000 audit[2161]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff53da97f a2=241 a3=1b6 items=1 ppid=2123 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.861000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:41:55.861000 audit: PATH item=0 name="/dev/fd/63" inode=19695 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.861000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.867000 audit[2149]: AVC avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=20602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.867000 audit[2149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb202196d a2=241 a3=1b6 items=1 ppid=2122 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.867000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:41:55.867000 audit: PATH item=0 name="/dev/fd/63" inode=20580 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.867000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.868000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=20606 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.868000 audit[2158]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4b2ce97e a2=241 a3=1b6 items=1 ppid=2119 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.868000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:41:55.868000 audit: PATH item=0 name="/dev/fd/63" inode=19694 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.868000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.879000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=20614 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.879000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf871897d a2=241 a3=1b6 items=1 ppid=2131 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.879000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:41:55.879000 audit: PATH item=0 name="/dev/fd/63" inode=19698 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.879000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.888000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=20619 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.888000 audit[2163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff244de97d a2=241 a3=1b6 items=1 ppid=2128 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.888000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:41:55.888000 audit: PATH item=0 name="/dev/fd/63" inode=20592 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.907000 audit[2184]: AVC avc: denied { write } for pid=2184 comm="tee" name="fd" dev="proc" ino=19708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.907000 audit[2184]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7bafd96e a2=241 a3=1b6 items=1 ppid=2138 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.907000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:41:55.907000 audit: PATH item=0 name="/dev/fd/63" inode=20621 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:55.926000 audit[2186]: AVC avc: denied { write } for pid=2186 comm="tee" name="fd" dev="proc" ino=20627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:41:55.926000 audit[2186]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9772f97d a2=241 a3=1b6 items=1 ppid=2118 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:55.926000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:41:55.926000 audit: PATH item=0 name="/dev/fd/63" inode=19702 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:55.926000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:56.204974 kubelet[1434]: E0212 19:41:56.204931 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:56.238243 systemd[1]: run-containerd-runc-k8s.io-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902-runc.osu8mj.mount: Deactivated successfully. Feb 12 19:41:56.301606 kernel: Initializing XFRM netlink socket Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit: BPF prog-id=84 op=LOAD Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9b4f5fd0 a2=70 a3=7f9c7f1d1000 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit: BPF prog-id=85 op=LOAD Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd9b4f5fd0 a2=70 a3=6e items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd9b4f5f80 a2=70 a3=7ffd9b4f5fd0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit: BPF prog-id=86 op=LOAD Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd9b4f5f60 a2=70 a3=7ffd9b4f5fd0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9b4f6040 a2=70 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd9b4f6030 a2=70 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.516000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.516000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd9b4f6070 a2=70 a3=0 items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.516000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.517000 audit: BPF prog-id=87 op=LOAD Feb 12 19:41:56.517000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd9b4f5f90 a2=70 a3=ffffffff items=0 ppid=2135 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:56.525000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.525000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8bea9230 a2=70 a3=fff80800 items=0 ppid=2135 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:56.525000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:56.525000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8bea9100 a2=70 a3=3 items=0 ppid=2135 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.525000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:56.534000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:41:56.630000 audit[2304]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:56.630000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc2a3e5e90 a2=0 a3=7ffc2a3e5e7c items=0 ppid=2135 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.636000 audit[2303]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:56.636000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff2c890d30 a2=0 a3=558efd37f000 items=0 ppid=2135 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:56.630000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:56.638000 audit[2305]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:56.638000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffffc40adb0 a2=0 a3=562c31bf2000 items=0 ppid=2135 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.638000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:56.640000 audit[2307]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:56.640000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd3a880360 a2=0 a3=558e32ade000 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:56.833916 kubelet[1434]: E0212 19:41:56.833733 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:57.323777 systemd-networkd[1010]: vxlan.calico: Link UP Feb 12 19:41:57.323790 systemd-networkd[1010]: vxlan.calico: Gained carrier Feb 12 19:41:57.834647 kubelet[1434]: E0212 19:41:57.834580 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:58.539694 update_engine[1101]: I0212 19:41:58.539124 1101 update_attempter.cc:509] Updating boot flags... Feb 12 19:41:58.557411 systemd[1]: run-containerd-runc-k8s.io-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902-runc.EPE86w.mount: Deactivated successfully. Feb 12 19:41:58.836348 kubelet[1434]: E0212 19:41:58.836282 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:59.096117 systemd-networkd[1010]: vxlan.calico: Gained IPv6LL Feb 12 19:41:59.836489 kubelet[1434]: E0212 19:41:59.836402 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:00.838374 kubelet[1434]: E0212 19:42:00.838203 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:01.060758 env[1109]: time="2024-02-12T19:42:01.060693920Z" level=info msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" Feb 12 19:42:01.197694 kubelet[1434]: I0212 19:42:01.197190 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-nr58c" podStartSLOduration=9.51869144 podCreationTimestamp="2024-02-12 19:41:27 +0000 UTC" firstStartedPulling="2024-02-12 19:41:29.315860879 +0000 UTC m=+4.217321484" lastFinishedPulling="2024-02-12 19:41:53.994304556 +0000 UTC m=+28.895765146" observedRunningTime="2024-02-12 19:41:55.223158052 +0000 UTC m=+30.124618666" watchObservedRunningTime="2024-02-12 19:42:01.197135102 +0000 UTC m=+36.098595718" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.198 [INFO][2365] k8s.go 578: Cleaning up netns ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.198 [INFO][2365] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" iface="eth0" netns="/var/run/netns/cni-050b882d-f3bc-1b8d-6bc0-068b297c922a" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.200 [INFO][2365] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" iface="eth0" netns="/var/run/netns/cni-050b882d-f3bc-1b8d-6bc0-068b297c922a" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.202 [INFO][2365] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" iface="eth0" netns="/var/run/netns/cni-050b882d-f3bc-1b8d-6bc0-068b297c922a" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.202 [INFO][2365] k8s.go 585: Releasing IP address(es) ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.203 [INFO][2365] utils.go 188: Calico CNI releasing IP address ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.334 [INFO][2372] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.334 [INFO][2372] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.334 [INFO][2372] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.359 [WARNING][2372] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.359 [INFO][2372] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.376 [INFO][2372] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:01.387285 env[1109]: 2024-02-12 19:42:01.381 [INFO][2365] k8s.go 591: Teardown processing complete. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:01.394815 systemd[1]: run-netns-cni\x2d050b882d\x2df3bc\x2d1b8d\x2d6bc0\x2d068b297c922a.mount: Deactivated successfully. Feb 12 19:42:01.399806 env[1109]: time="2024-02-12T19:42:01.399714112Z" level=info msg="TearDown network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" successfully" Feb 12 19:42:01.400129 env[1109]: time="2024-02-12T19:42:01.400062985Z" level=info msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" returns successfully" Feb 12 19:42:01.404459 env[1109]: time="2024-02-12T19:42:01.404384536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7tfc6,Uid:7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c,Namespace:calico-system,Attempt:1,}" Feb 12 19:42:01.844804 kubelet[1434]: E0212 19:42:01.844747 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:01.993249 systemd-networkd[1010]: califf91b141b5e: Link UP Feb 12 19:42:01.995921 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:42:01.996398 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf91b141b5e: link becomes ready Feb 12 19:42:01.996706 systemd-networkd[1010]: califf91b141b5e: Gained carrier Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.578 [INFO][2378] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {164.92.111.11-k8s-csi--node--driver--7tfc6-eth0 csi-node-driver- calico-system 7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c 1152 0 2024-02-12 19:41:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 164.92.111.11 csi-node-driver-7tfc6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] califf91b141b5e [] []}} ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.579 [INFO][2378] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.670 [INFO][2390] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" HandleID="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.745 [INFO][2390] ipam_plugin.go 268: Auto assigning IP ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" HandleID="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027da10), Attrs:map[string]string{"namespace":"calico-system", "node":"164.92.111.11", "pod":"csi-node-driver-7tfc6", "timestamp":"2024-02-12 19:42:01.670641233 +0000 UTC"}, Hostname:"164.92.111.11", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.745 [INFO][2390] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.745 [INFO][2390] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.745 [INFO][2390] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '164.92.111.11' Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.759 [INFO][2390] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.835 [INFO][2390] ipam.go 372: Looking up existing affinities for host host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.886 [INFO][2390] ipam.go 489: Trying affinity for 192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.892 [INFO][2390] ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.904 [INFO][2390] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.904 [INFO][2390] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.910 [INFO][2390] ipam.go 1682: Creating new handle: k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0 Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.931 [INFO][2390] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.977 [INFO][2390] ipam.go 1216: Successfully claimed IPs: [192.168.97.129/26] block=192.168.97.128/26 handle="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.977 [INFO][2390] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.129/26] handle="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" host="164.92.111.11" Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.977 [INFO][2390] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:02.066616 env[1109]: 2024-02-12 19:42:01.977 [INFO][2390] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.97.129/26] IPv6=[] ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" HandleID="k8s-pod-network.2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:01.981 [INFO][2378] k8s.go 385: Populated endpoint ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-csi--node--driver--7tfc6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"", Pod:"csi-node-driver-7tfc6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califf91b141b5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:01.981 [INFO][2378] k8s.go 386: Calico CNI using IPs: [192.168.97.129/32] ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:01.981 [INFO][2378] dataplane_linux.go 68: Setting the host side veth name to califf91b141b5e ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:01.999 [INFO][2378] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:01.999 [INFO][2378] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-csi--node--driver--7tfc6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0", Pod:"csi-node-driver-7tfc6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califf91b141b5e", MAC:"76:32:c1:fb:ea:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:02.071904 env[1109]: 2024-02-12 19:42:02.055 [INFO][2378] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0" Namespace="calico-system" Pod="csi-node-driver-7tfc6" WorkloadEndpoint="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:02.107543 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 19:42:02.107847 kernel: audit: type=1325 audit(1707766922.095:709): table=filter:73 family=2 entries=36 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:02.107946 kernel: audit: type=1300 audit(1707766922.095:709): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffee9aafe0 a2=0 a3=7fffee9aafcc items=0 ppid=2135 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.095000 audit[2423]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:02.095000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffee9aafe0 a2=0 a3=7fffee9aafcc items=0 ppid=2135 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.095000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:02.119163 kernel: audit: type=1327 audit(1707766922.095:709): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:02.143852 env[1109]: time="2024-02-12T19:42:02.143571529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:42:02.143852 env[1109]: time="2024-02-12T19:42:02.143642579Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:42:02.143852 env[1109]: time="2024-02-12T19:42:02.143659354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:42:02.144634 env[1109]: time="2024-02-12T19:42:02.144424217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0 pid=2430 runtime=io.containerd.runc.v2 Feb 12 19:42:02.199754 systemd[1]: Started cri-containerd-2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0.scope. Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.248118 kernel: audit: type=1400 audit(1707766922.231:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.252166 kernel: audit: type=1400 audit(1707766922.231:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.261419 kernel: audit: type=1400 audit(1707766922.231:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.261599 kernel: audit: type=1400 audit(1707766922.231:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.261644 kernel: audit: type=1400 audit(1707766922.231:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.266433 kernel: audit: type=1400 audit(1707766922.231:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.270928 kernel: audit: type=1400 audit(1707766922.231:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.246000 audit: BPF prog-id=88 op=LOAD Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2430 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653534393063633031393537313465346665616532383363613664 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2430 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653534393063633031393537313465346665616532383363613664 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit: BPF prog-id=89 op=LOAD Feb 12 19:42:02.251000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300350 items=0 ppid=2430 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653534393063633031393537313465346665616532383363613664 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit: BPF prog-id=90 op=LOAD Feb 12 19:42:02.251000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300398 items=0 ppid=2430 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653534393063633031393537313465346665616532383363613664 Feb 12 19:42:02.251000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:42:02.251000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { perfmon } for pid=2442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit[2442]: AVC avc: denied { bpf } for pid=2442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:02.251000 audit: BPF prog-id=91 op=LOAD Feb 12 19:42:02.251000 audit[2442]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003007a8 items=0 ppid=2430 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:02.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653534393063633031393537313465346665616532383363613664 Feb 12 19:42:02.386036 env[1109]: time="2024-02-12T19:42:02.385834927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7tfc6,Uid:7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c,Namespace:calico-system,Attempt:1,} returns sandbox id \"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0\"" Feb 12 19:42:02.394445 env[1109]: time="2024-02-12T19:42:02.394379906Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:42:02.846525 kubelet[1434]: E0212 19:42:02.845951 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:03.847003 kubelet[1434]: E0212 19:42:03.846803 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:04.023616 systemd-networkd[1010]: califf91b141b5e: Gained IPv6LL Feb 12 19:42:04.294004 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2112267468.mount: Deactivated successfully. Feb 12 19:42:04.847180 kubelet[1434]: E0212 19:42:04.847111 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:05.047562 env[1109]: time="2024-02-12T19:42:05.047492075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:05.056390 env[1109]: time="2024-02-12T19:42:05.056129816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:05.065176 env[1109]: time="2024-02-12T19:42:05.064370502Z" level=info msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" Feb 12 19:42:05.067604 env[1109]: time="2024-02-12T19:42:05.067496892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:05.077304 env[1109]: time="2024-02-12T19:42:05.077211232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:05.103304 env[1109]: time="2024-02-12T19:42:05.079134522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:42:05.104622 env[1109]: time="2024-02-12T19:42:05.104567384Z" level=info msg="CreateContainer within sandbox \"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:42:05.261787 env[1109]: time="2024-02-12T19:42:05.261712096Z" level=info msg="CreateContainer within sandbox \"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"badb021b3864f03456b7c534c614698a3e97fe55c6cd4817db652360eda654bb\"" Feb 12 19:42:05.264290 env[1109]: time="2024-02-12T19:42:05.263271360Z" level=info msg="StartContainer for \"badb021b3864f03456b7c534c614698a3e97fe55c6cd4817db652360eda654bb\"" Feb 12 19:42:05.369653 systemd[1]: run-containerd-runc-k8s.io-badb021b3864f03456b7c534c614698a3e97fe55c6cd4817db652360eda654bb-runc.v72n0X.mount: Deactivated successfully. Feb 12 19:42:05.394320 systemd[1]: Started cri-containerd-badb021b3864f03456b7c534c614698a3e97fe55c6cd4817db652360eda654bb.scope. Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2430 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:05.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646230323162333836346630333435366237633533346336313436 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit: BPF prog-id=92 op=LOAD Feb 12 19:42:05.510000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00029a940 items=0 ppid=2430 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:05.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646230323162333836346630333435366237633533346336313436 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.510000 audit: BPF prog-id=93 op=LOAD Feb 12 19:42:05.510000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00029a988 items=0 ppid=2430 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:05.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646230323162333836346630333435366237633533346336313436 Feb 12 19:42:05.511000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:42:05.511000 audit: BPF prog-id=92 op=UNLOAD Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:05.511000 audit: BPF prog-id=94 op=LOAD Feb 12 19:42:05.511000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00029aa18 items=0 ppid=2430 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:05.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261646230323162333836346630333435366237633533346336313436 Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.275 [INFO][2482] k8s.go 578: Cleaning up netns ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.275 [INFO][2482] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" iface="eth0" netns="/var/run/netns/cni-4db6569e-57c6-acb7-8261-93da88da706d" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.276 [INFO][2482] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" iface="eth0" netns="/var/run/netns/cni-4db6569e-57c6-acb7-8261-93da88da706d" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.276 [INFO][2482] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" iface="eth0" netns="/var/run/netns/cni-4db6569e-57c6-acb7-8261-93da88da706d" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.276 [INFO][2482] k8s.go 585: Releasing IP address(es) ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.276 [INFO][2482] utils.go 188: Calico CNI releasing IP address ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.470 [INFO][2495] ipam_plugin.go 415: Releasing address using handleID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.470 [INFO][2495] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.470 [INFO][2495] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.512 [WARNING][2495] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.512 [INFO][2495] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.526 [INFO][2495] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:05.535091 env[1109]: 2024-02-12 19:42:05.532 [INFO][2482] k8s.go 591: Teardown processing complete. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:05.537262 env[1109]: time="2024-02-12T19:42:05.537198477Z" level=info msg="TearDown network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" successfully" Feb 12 19:42:05.537470 env[1109]: time="2024-02-12T19:42:05.537431494Z" level=info msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" returns successfully" Feb 12 19:42:05.543649 systemd[1]: run-netns-cni\x2d4db6569e\x2d57c6\x2dacb7\x2d8261\x2d93da88da706d.mount: Deactivated successfully. Feb 12 19:42:05.548108 env[1109]: time="2024-02-12T19:42:05.548013997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-ndztm,Uid:9d350b63-8b01-4bea-b6ac-12a4be6f1168,Namespace:default,Attempt:1,}" Feb 12 19:42:05.617872 env[1109]: time="2024-02-12T19:42:05.615550614Z" level=info msg="StartContainer for \"badb021b3864f03456b7c534c614698a3e97fe55c6cd4817db652360eda654bb\" returns successfully" Feb 12 19:42:05.625079 env[1109]: time="2024-02-12T19:42:05.625008077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:42:05.799522 kubelet[1434]: E0212 19:42:05.798744 1434 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:05.848023 kubelet[1434]: E0212 19:42:05.847921 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:06.155887 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:42:06.156127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8c5da1390d3: link becomes ready Feb 12 19:42:06.155249 systemd-networkd[1010]: cali8c5da1390d3: Link UP Feb 12 19:42:06.155712 systemd-networkd[1010]: cali8c5da1390d3: Gained carrier Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.835 [INFO][2530] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0 nginx-deployment-845c78c8b9- default 9d350b63-8b01-4bea-b6ac-12a4be6f1168 1168 0 2024-02-12 19:41:51 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 164.92.111.11 nginx-deployment-845c78c8b9-ndztm eth0 default [] [] [kns.default ksa.default.default] cali8c5da1390d3 [] []}} ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.835 [INFO][2530] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.898 [INFO][2542] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" HandleID="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.953 [INFO][2542] ipam_plugin.go 268: Auto assigning IP ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" HandleID="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d230), Attrs:map[string]string{"namespace":"default", "node":"164.92.111.11", "pod":"nginx-deployment-845c78c8b9-ndztm", "timestamp":"2024-02-12 19:42:05.898577531 +0000 UTC"}, Hostname:"164.92.111.11", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.953 [INFO][2542] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.958 [INFO][2542] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.958 [INFO][2542] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '164.92.111.11' Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.968 [INFO][2542] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:05.991 [INFO][2542] ipam.go 372: Looking up existing affinities for host host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.001 [INFO][2542] ipam.go 489: Trying affinity for 192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.014 [INFO][2542] ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.039 [INFO][2542] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.039 [INFO][2542] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.054 [INFO][2542] ipam.go 1682: Creating new handle: k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1 Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.070 [INFO][2542] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.099 [INFO][2542] ipam.go 1216: Successfully claimed IPs: [192.168.97.130/26] block=192.168.97.128/26 handle="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.099 [INFO][2542] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.130/26] handle="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" host="164.92.111.11" Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.099 [INFO][2542] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:06.208564 env[1109]: 2024-02-12 19:42:06.099 [INFO][2542] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.97.130/26] IPv6=[] ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" HandleID="k8s-pod-network.97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.102 [INFO][2530] k8s.go 385: Populated endpoint ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9d350b63-8b01-4bea-b6ac-12a4be6f1168", ResourceVersion:"1168", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-ndztm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c5da1390d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.103 [INFO][2530] k8s.go 386: Calico CNI using IPs: [192.168.97.130/32] ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.103 [INFO][2530] dataplane_linux.go 68: Setting the host side veth name to cali8c5da1390d3 ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.142 [INFO][2530] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.157 [INFO][2530] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9d350b63-8b01-4bea-b6ac-12a4be6f1168", ResourceVersion:"1168", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1", Pod:"nginx-deployment-845c78c8b9-ndztm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c5da1390d3", MAC:"4e:36:03:02:66:7a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:06.209990 env[1109]: 2024-02-12 19:42:06.198 [INFO][2530] k8s.go 491: Wrote updated endpoint to datastore ContainerID="97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1" Namespace="default" Pod="nginx-deployment-845c78c8b9-ndztm" WorkloadEndpoint="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:06.281000 audit[2563]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:06.281000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffd43d463f0 a2=0 a3=7ffd43d463dc items=0 ppid=2135 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.281000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:06.300610 env[1109]: time="2024-02-12T19:42:06.300335273Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:42:06.300610 env[1109]: time="2024-02-12T19:42:06.300389102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:42:06.300610 env[1109]: time="2024-02-12T19:42:06.300418734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:42:06.301186 env[1109]: time="2024-02-12T19:42:06.301026785Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1 pid=2574 runtime=io.containerd.runc.v2 Feb 12 19:42:06.333622 systemd[1]: Started cri-containerd-97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1.scope. Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.363000 audit: BPF prog-id=95 op=LOAD Feb 12 19:42:06.365000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.365000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2574 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937653135393638353637636465663262376434613336356239616661 Feb 12 19:42:06.365000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.365000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2574 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937653135393638353637636465663262376434613336356239616661 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.366000 audit: BPF prog-id=96 op=LOAD Feb 12 19:42:06.366000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d48b0 items=0 ppid=2574 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937653135393638353637636465663262376434613336356239616661 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.368000 audit: BPF prog-id=97 op=LOAD Feb 12 19:42:06.368000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d48f8 items=0 ppid=2574 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937653135393638353637636465663262376434613336356239616661 Feb 12 19:42:06.369000 audit: BPF prog-id=97 op=UNLOAD Feb 12 19:42:06.369000 audit: BPF prog-id=96 op=UNLOAD Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:06.369000 audit: BPF prog-id=98 op=LOAD Feb 12 19:42:06.369000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4d08 items=0 ppid=2574 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:06.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937653135393638353637636465663262376434613336356239616661 Feb 12 19:42:06.459638 env[1109]: time="2024-02-12T19:42:06.455845142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-ndztm,Uid:9d350b63-8b01-4bea-b6ac-12a4be6f1168,Namespace:default,Attempt:1,} returns sandbox id \"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1\"" Feb 12 19:42:06.848318 kubelet[1434]: E0212 19:42:06.848206 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:07.235098 systemd-networkd[1010]: cali8c5da1390d3: Gained IPv6LL Feb 12 19:42:07.849946 kubelet[1434]: E0212 19:42:07.849888 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:08.150108 env[1109]: time="2024-02-12T19:42:08.149345970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:08.155231 env[1109]: time="2024-02-12T19:42:08.155157047Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:08.163370 env[1109]: time="2024-02-12T19:42:08.161021983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:08.165405 env[1109]: time="2024-02-12T19:42:08.165330439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:08.167417 env[1109]: time="2024-02-12T19:42:08.167033679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:42:08.170476 env[1109]: time="2024-02-12T19:42:08.170418627Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:42:08.176102 env[1109]: time="2024-02-12T19:42:08.175821638Z" level=info msg="CreateContainer within sandbox \"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:42:08.249342 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1487766425.mount: Deactivated successfully. Feb 12 19:42:08.263430 env[1109]: time="2024-02-12T19:42:08.261434373Z" level=info msg="CreateContainer within sandbox \"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"66b1d1fd2d89ce738638a9f1b853b9edb0e3ec497f89ff5cb29887428521f721\"" Feb 12 19:42:08.267124 env[1109]: time="2024-02-12T19:42:08.264737582Z" level=info msg="StartContainer for \"66b1d1fd2d89ce738638a9f1b853b9edb0e3ec497f89ff5cb29887428521f721\"" Feb 12 19:42:08.442515 systemd[1]: Started cri-containerd-66b1d1fd2d89ce738638a9f1b853b9edb0e3ec497f89ff5cb29887428521f721.scope. Feb 12 19:42:08.523277 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 12 19:42:08.523485 kernel: audit: type=1400 audit(1707766928.504:753): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.504000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.529205 kernel: audit: type=1300 audit(1707766928.504:753): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2430 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:08.504000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2430 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:08.583002 kernel: audit: type=1327 audit(1707766928.504:753): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623164316664326438396365373338363338613966316238353362 Feb 12 19:42:08.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623164316664326438396365373338363338613966316238353362 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.591443 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.591624 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.596014 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.607573 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.607788 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.615479 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.615656 kernel: audit: type=1400 audit(1707766928.531:754): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.531000 audit: BPF prog-id=99 op=LOAD Feb 12 19:42:08.531000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002e3eb0 items=0 ppid=2430 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:08.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623164316664326438396365373338363338613966316238353362 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.628000 audit: BPF prog-id=100 op=LOAD Feb 12 19:42:08.628000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002e3ef8 items=0 ppid=2430 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:08.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623164316664326438396365373338363338613966316238353362 Feb 12 19:42:08.631000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:42:08.631000 audit: BPF prog-id=99 op=UNLOAD Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:08.631000 audit: BPF prog-id=101 op=LOAD Feb 12 19:42:08.631000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002e3f88 items=0 ppid=2430 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:08.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636623164316664326438396365373338363338613966316238353362 Feb 12 19:42:08.808760 env[1109]: time="2024-02-12T19:42:08.806840306Z" level=info msg="StartContainer for \"66b1d1fd2d89ce738638a9f1b853b9edb0e3ec497f89ff5cb29887428521f721\" returns successfully" Feb 12 19:42:08.850987 kubelet[1434]: E0212 19:42:08.850877 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:09.026174 kubelet[1434]: I0212 19:42:09.025835 1434 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:42:09.034818 kubelet[1434]: I0212 19:42:09.034707 1434 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:42:09.224345 systemd[1]: run-containerd-runc-k8s.io-66b1d1fd2d89ce738638a9f1b853b9edb0e3ec497f89ff5cb29887428521f721-runc.Hy2tsM.mount: Deactivated successfully. Feb 12 19:42:09.851219 kubelet[1434]: E0212 19:42:09.851138 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:10.852095 kubelet[1434]: E0212 19:42:10.852015 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:11.853278 kubelet[1434]: E0212 19:42:11.853170 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:12.854907 kubelet[1434]: E0212 19:42:12.854820 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:13.808566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2312107490.mount: Deactivated successfully. Feb 12 19:42:13.855810 kubelet[1434]: E0212 19:42:13.855718 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:14.856359 kubelet[1434]: E0212 19:42:14.856293 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:15.431431 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 12 19:42:15.431619 kernel: audit: type=1130 audit(1707766935.427:759): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.111.11:22-198.235.24.202:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:15.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.111.11:22-198.235.24.202:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:15.428104 systemd[1]: Started sshd@8-164.92.111.11:22-198.235.24.202:56124.service. Feb 12 19:42:15.764410 sshd[2651]: kex_exchange_identification: Connection closed by remote host Feb 12 19:42:15.766585 sshd[2651]: Connection closed by 198.235.24.202 port 56124 Feb 12 19:42:15.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.111.11:22-198.235.24.202:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:15.773920 systemd[1]: sshd@8-164.92.111.11:22-198.235.24.202:56124.service: Deactivated successfully. Feb 12 19:42:15.779627 kernel: audit: type=1131 audit(1707766935.773:760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.111.11:22-198.235.24.202:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:15.860855 kubelet[1434]: E0212 19:42:15.857432 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:16.082298 env[1109]: time="2024-02-12T19:42:16.081456251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:16.097691 env[1109]: time="2024-02-12T19:42:16.097616732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:16.111252 env[1109]: time="2024-02-12T19:42:16.111190223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:16.117635 env[1109]: time="2024-02-12T19:42:16.117574630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:16.121822 env[1109]: time="2024-02-12T19:42:16.118774320Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:42:16.126864 env[1109]: time="2024-02-12T19:42:16.126802838Z" level=info msg="CreateContainer within sandbox \"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:42:16.196996 env[1109]: time="2024-02-12T19:42:16.196817902Z" level=info msg="CreateContainer within sandbox \"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a6f39d3c34a804be48e0cbbcbfee6ffc6b52d165dff4f4a44666a29b0b5316f3\"" Feb 12 19:42:16.198409 env[1109]: time="2024-02-12T19:42:16.198365972Z" level=info msg="StartContainer for \"a6f39d3c34a804be48e0cbbcbfee6ffc6b52d165dff4f4a44666a29b0b5316f3\"" Feb 12 19:42:16.256771 systemd[1]: Started cri-containerd-a6f39d3c34a804be48e0cbbcbfee6ffc6b52d165dff4f4a44666a29b0b5316f3.scope. Feb 12 19:42:16.305324 kernel: audit: type=1400 audit(1707766936.296:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.305596 kernel: audit: type=1400 audit(1707766936.297:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.305648 kernel: audit: type=1400 audit(1707766936.297:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.311829 kernel: audit: type=1400 audit(1707766936.297:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.312101 kernel: audit: type=1400 audit(1707766936.297:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.316208 kernel: audit: type=1400 audit(1707766936.297:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.328112 kernel: audit: type=1400 audit(1707766936.297:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.328339 kernel: audit: type=1400 audit(1707766936.297:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.307000 audit: BPF prog-id=102 op=LOAD Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2574 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663339643363333461383034626534386530636262636266656536 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2574 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663339643363333461383034626534386530636262636266656536 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.313000 audit: BPF prog-id=103 op=LOAD Feb 12 19:42:16.313000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000310360 items=0 ppid=2574 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:16.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663339643363333461383034626534386530636262636266656536 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.319000 audit: BPF prog-id=104 op=LOAD Feb 12 19:42:16.319000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003103a8 items=0 ppid=2574 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:16.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663339643363333461383034626534386530636262636266656536 Feb 12 19:42:16.319000 audit: BPF prog-id=104 op=UNLOAD Feb 12 19:42:16.319000 audit: BPF prog-id=103 op=UNLOAD Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:16.330000 audit: BPF prog-id=105 op=LOAD Feb 12 19:42:16.330000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003107b8 items=0 ppid=2574 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:16.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663339643363333461383034626534386530636262636266656536 Feb 12 19:42:16.416823 env[1109]: time="2024-02-12T19:42:16.416746230Z" level=info msg="StartContainer for \"a6f39d3c34a804be48e0cbbcbfee6ffc6b52d165dff4f4a44666a29b0b5316f3\" returns successfully" Feb 12 19:42:16.466466 kubelet[1434]: I0212 19:42:16.466399 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7tfc6" podStartSLOduration=43.691190426 podCreationTimestamp="2024-02-12 19:41:27 +0000 UTC" firstStartedPulling="2024-02-12 19:42:02.39307151 +0000 UTC m=+37.294532102" lastFinishedPulling="2024-02-12 19:42:08.168114346 +0000 UTC m=+43.069574956" observedRunningTime="2024-02-12 19:42:09.376776892 +0000 UTC m=+44.278237505" watchObservedRunningTime="2024-02-12 19:42:16.46623328 +0000 UTC m=+51.367693900" Feb 12 19:42:16.467219 kubelet[1434]: I0212 19:42:16.467127 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-ndztm" podStartSLOduration=15.80591457 podCreationTimestamp="2024-02-12 19:41:51 +0000 UTC" firstStartedPulling="2024-02-12 19:42:06.458461326 +0000 UTC m=+41.359921925" lastFinishedPulling="2024-02-12 19:42:16.119567426 +0000 UTC m=+51.021028106" observedRunningTime="2024-02-12 19:42:16.465915049 +0000 UTC m=+51.367375670" watchObservedRunningTime="2024-02-12 19:42:16.467020751 +0000 UTC m=+51.368481363" Feb 12 19:42:16.858557 kubelet[1434]: E0212 19:42:16.858367 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:17.858934 kubelet[1434]: E0212 19:42:17.858821 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:18.859674 kubelet[1434]: E0212 19:42:18.859583 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:19.860833 kubelet[1434]: E0212 19:42:19.860724 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:20.103000 audit[2719]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.103000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffcf65fb060 a2=0 a3=7ffcf65fb04c items=0 ppid=1582 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.104000 audit[2719]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.104000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffcf65fb060 a2=0 a3=31030 items=0 ppid=1582 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.142000 audit[2721]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.142000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe9c22dd20 a2=0 a3=7ffe9c22dd0c items=0 ppid=1582 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.145000 audit[2721]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.145000 audit[2721]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffe9c22dd20 a2=0 a3=31030 items=0 ppid=1582 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.259394 kubelet[1434]: I0212 19:42:20.258424 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:42:20.269252 systemd[1]: Created slice kubepods-besteffort-pod1a9fae4b_c524_4fe6_a294_a7da14ed9fe6.slice. Feb 12 19:42:20.434738 kubelet[1434]: I0212 19:42:20.434582 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/1a9fae4b-c524-4fe6-a294-a7da14ed9fe6-data\") pod \"nfs-server-provisioner-0\" (UID: \"1a9fae4b-c524-4fe6-a294-a7da14ed9fe6\") " pod="default/nfs-server-provisioner-0" Feb 12 19:42:20.435128 kubelet[1434]: I0212 19:42:20.435105 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dh8ll\" (UniqueName: \"kubernetes.io/projected/1a9fae4b-c524-4fe6-a294-a7da14ed9fe6-kube-api-access-dh8ll\") pod \"nfs-server-provisioner-0\" (UID: \"1a9fae4b-c524-4fe6-a294-a7da14ed9fe6\") " pod="default/nfs-server-provisioner-0" Feb 12 19:42:20.577374 env[1109]: time="2024-02-12T19:42:20.576483523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1a9fae4b-c524-4fe6-a294-a7da14ed9fe6,Namespace:default,Attempt:0,}" Feb 12 19:42:20.861844 kubelet[1434]: E0212 19:42:20.861716 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:20.937028 systemd-networkd[1010]: cali60e51b789ff: Link UP Feb 12 19:42:20.939163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:42:20.939339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:42:20.939671 systemd-networkd[1010]: cali60e51b789ff: Gained carrier Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.708 [INFO][2723] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {164.92.111.11-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 1a9fae4b-c524-4fe6-a294-a7da14ed9fe6 1239 0 2024-02-12 19:42:20 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 164.92.111.11 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.709 [INFO][2723] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.800 [INFO][2735] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" HandleID="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Workload="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.835 [INFO][2735] ipam_plugin.go 268: Auto assigning IP ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" HandleID="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Workload="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b63c0), Attrs:map[string]string{"namespace":"default", "node":"164.92.111.11", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:42:20.800072746 +0000 UTC"}, Hostname:"164.92.111.11", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.836 [INFO][2735] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.836 [INFO][2735] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.837 [INFO][2735] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '164.92.111.11' Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.842 [INFO][2735] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.852 [INFO][2735] ipam.go 372: Looking up existing affinities for host host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.868 [INFO][2735] ipam.go 489: Trying affinity for 192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.874 [INFO][2735] ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.886 [INFO][2735] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.886 [INFO][2735] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.894 [INFO][2735] ipam.go 1682: Creating new handle: k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9 Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.905 [INFO][2735] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.922 [INFO][2735] ipam.go 1216: Successfully claimed IPs: [192.168.97.131/26] block=192.168.97.128/26 handle="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.922 [INFO][2735] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.131/26] handle="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" host="164.92.111.11" Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.922 [INFO][2735] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:20.965954 env[1109]: 2024-02-12 19:42:20.922 [INFO][2735] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.97.131/26] IPv6=[] ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" HandleID="k8s-pod-network.f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Workload="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.967378 env[1109]: 2024-02-12 19:42:20.929 [INFO][2723] k8s.go 385: Populated endpoint ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1a9fae4b-c524-4fe6-a294-a7da14ed9fe6", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:20.967378 env[1109]: 2024-02-12 19:42:20.929 [INFO][2723] k8s.go 386: Calico CNI using IPs: [192.168.97.131/32] ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.967378 env[1109]: 2024-02-12 19:42:20.930 [INFO][2723] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.967378 env[1109]: 2024-02-12 19:42:20.939 [INFO][2723] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:20.967739 env[1109]: 2024-02-12 19:42:20.942 [INFO][2723] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1a9fae4b-c524-4fe6-a294-a7da14ed9fe6", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 42, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"a2:68:d6:0f:28:45", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:20.967739 env[1109]: 2024-02-12 19:42:20.963 [INFO][2723] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="164.92.111.11-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:42:21.025261 env[1109]: time="2024-02-12T19:42:21.023747826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:42:21.025261 env[1109]: time="2024-02-12T19:42:21.023819463Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:42:21.025261 env[1109]: time="2024-02-12T19:42:21.023837966Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:42:21.026026 env[1109]: time="2024-02-12T19:42:21.025916526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9 pid=2766 runtime=io.containerd.runc.v2 Feb 12 19:42:21.035372 kernel: kauditd_printk_skb: 61 callbacks suppressed Feb 12 19:42:21.035549 kernel: audit: type=1325 audit(1707766941.026:783): table=filter:79 family=2 entries=38 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:21.026000 audit[2771]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:21.026000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffde1394870 a2=0 a3=7ffde139485c items=0 ppid=2135 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.046453 kernel: audit: type=1300 audit(1707766941.026:783): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffde1394870 a2=0 a3=7ffde139485c items=0 ppid=2135 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.046646 kernel: audit: type=1327 audit(1707766941.026:783): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:21.026000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:21.063010 systemd[1]: Started cri-containerd-f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9.scope. Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.115274 kernel: audit: type=1400 audit(1707766941.106:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.115487 kernel: audit: type=1400 audit(1707766941.106:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.115538 kernel: audit: type=1400 audit(1707766941.106:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.130619 kernel: audit: type=1400 audit(1707766941.106:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.130943 kernel: audit: type=1400 audit(1707766941.106:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.131017 kernel: audit: type=1400 audit(1707766941.106:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.134464 kernel: audit: type=1400 audit(1707766941.106:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.118000 audit: BPF prog-id=106 op=LOAD Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013fc48 a2=10 a3=1c items=0 ppid=2766 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323731386266623066623235343336333232313836333234656162 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013f6b0 a2=3c a3=c items=0 ppid=2766 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323731386266623066623235343336333232313836333234656162 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit: BPF prog-id=107 op=LOAD Feb 12 19:42:21.120000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013f9d8 a2=78 a3=c0001d0cf0 items=0 ppid=2766 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323731386266623066623235343336333232313836333234656162 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit: BPF prog-id=108 op=LOAD Feb 12 19:42:21.120000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013f770 a2=78 a3=c0001d0d38 items=0 ppid=2766 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323731386266623066623235343336333232313836333234656162 Feb 12 19:42:21.120000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:42:21.120000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { perfmon } for pid=2776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit[2776]: AVC avc: denied { bpf } for pid=2776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:21.120000 audit: BPF prog-id=109 op=LOAD Feb 12 19:42:21.120000 audit[2776]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013fc30 a2=78 a3=c0001d1148 items=0 ppid=2766 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323731386266623066623235343336333232313836333234656162 Feb 12 19:42:21.253223 env[1109]: time="2024-02-12T19:42:21.253160899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1a9fae4b-c524-4fe6-a294-a7da14ed9fe6,Namespace:default,Attempt:0,} returns sandbox id \"f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9\"" Feb 12 19:42:21.268734 env[1109]: time="2024-02-12T19:42:21.266696061Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:42:21.567024 systemd[1]: run-containerd-runc-k8s.io-f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9-runc.DlvoWV.mount: Deactivated successfully. Feb 12 19:42:21.862889 kubelet[1434]: E0212 19:42:21.862802 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:22.874229 kubelet[1434]: E0212 19:42:22.873959 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:22.968819 systemd-networkd[1010]: cali60e51b789ff: Gained IPv6LL Feb 12 19:42:23.892930 kubelet[1434]: E0212 19:42:23.874157 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:24.873110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount546070257.mount: Deactivated successfully. Feb 12 19:42:24.882939 kubelet[1434]: E0212 19:42:24.882872 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:25.791361 kubelet[1434]: E0212 19:42:25.791289 1434 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:25.832243 env[1109]: time="2024-02-12T19:42:25.832182151Z" level=info msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" Feb 12 19:42:25.883731 kubelet[1434]: E0212 19:42:25.883645 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.933 [WARNING][2815] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-csi--node--driver--7tfc6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0", Pod:"csi-node-driver-7tfc6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califf91b141b5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.933 [INFO][2815] k8s.go 578: Cleaning up netns ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.934 [INFO][2815] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" iface="eth0" netns="" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.934 [INFO][2815] k8s.go 585: Releasing IP address(es) ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.934 [INFO][2815] utils.go 188: Calico CNI releasing IP address ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.997 [INFO][2821] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.998 [INFO][2821] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:25.998 [INFO][2821] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:26.012 [WARNING][2821] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:26.012 [INFO][2821] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:26.032 [INFO][2821] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:26.036111 env[1109]: 2024-02-12 19:42:26.034 [INFO][2815] k8s.go 591: Teardown processing complete. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.037349 env[1109]: time="2024-02-12T19:42:26.036149188Z" level=info msg="TearDown network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" successfully" Feb 12 19:42:26.037349 env[1109]: time="2024-02-12T19:42:26.036200356Z" level=info msg="StopPodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" returns successfully" Feb 12 19:42:26.038426 env[1109]: time="2024-02-12T19:42:26.038362899Z" level=info msg="RemovePodSandbox for \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" Feb 12 19:42:26.038659 env[1109]: time="2024-02-12T19:42:26.038425455Z" level=info msg="Forcibly stopping sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\"" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.181 [WARNING][2845] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-csi--node--driver--7tfc6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7b5d9558-37d6-4b28-be3a-c2cc9bac7a8c", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"2ce5490cc0195714e4feae283ca6d4d5192ac90a520afebaa7522bdb7660c1a0", Pod:"csi-node-driver-7tfc6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califf91b141b5e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.181 [INFO][2845] k8s.go 578: Cleaning up netns ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.181 [INFO][2845] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" iface="eth0" netns="" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.182 [INFO][2845] k8s.go 585: Releasing IP address(es) ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.182 [INFO][2845] utils.go 188: Calico CNI releasing IP address ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.234 [INFO][2851] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.235 [INFO][2851] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.235 [INFO][2851] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.247 [WARNING][2851] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.248 [INFO][2851] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" HandleID="k8s-pod-network.fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Workload="164.92.111.11-k8s-csi--node--driver--7tfc6-eth0" Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.252 [INFO][2851] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:26.256705 env[1109]: 2024-02-12 19:42:26.254 [INFO][2845] k8s.go 591: Teardown processing complete. ContainerID="fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7" Feb 12 19:42:26.256705 env[1109]: time="2024-02-12T19:42:26.256177008Z" level=info msg="TearDown network for sandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" successfully" Feb 12 19:42:26.261571 env[1109]: time="2024-02-12T19:42:26.261465107Z" level=info msg="RemovePodSandbox \"fd68213566cc7ac7d67dcdbe6059c9038a74509cb1eba6e2c6251d0576f119e7\" returns successfully" Feb 12 19:42:26.262330 env[1109]: time="2024-02-12T19:42:26.262259232Z" level=info msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.359 [WARNING][2872] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9d350b63-8b01-4bea-b6ac-12a4be6f1168", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1", Pod:"nginx-deployment-845c78c8b9-ndztm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c5da1390d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.360 [INFO][2872] k8s.go 578: Cleaning up netns ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.361 [INFO][2872] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" iface="eth0" netns="" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.361 [INFO][2872] k8s.go 585: Releasing IP address(es) ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.361 [INFO][2872] utils.go 188: Calico CNI releasing IP address ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.400 [INFO][2878] ipam_plugin.go 415: Releasing address using handleID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.400 [INFO][2878] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.401 [INFO][2878] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.416 [WARNING][2878] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.416 [INFO][2878] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.421 [INFO][2878] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:26.425653 env[1109]: 2024-02-12 19:42:26.423 [INFO][2872] k8s.go 591: Teardown processing complete. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.426614 env[1109]: time="2024-02-12T19:42:26.425688322Z" level=info msg="TearDown network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" successfully" Feb 12 19:42:26.426614 env[1109]: time="2024-02-12T19:42:26.425738260Z" level=info msg="StopPodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" returns successfully" Feb 12 19:42:26.426614 env[1109]: time="2024-02-12T19:42:26.426556874Z" level=info msg="RemovePodSandbox for \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" Feb 12 19:42:26.426982 env[1109]: time="2024-02-12T19:42:26.426640800Z" level=info msg="Forcibly stopping sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\"" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.516 [WARNING][2898] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"9d350b63-8b01-4bea-b6ac-12a4be6f1168", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"97e15968567cdef2b7d4a365b9afa26e6de3cc83a47e9f7f5786b61e0a8ac7e1", Pod:"nginx-deployment-845c78c8b9-ndztm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8c5da1390d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.516 [INFO][2898] k8s.go 578: Cleaning up netns ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.517 [INFO][2898] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" iface="eth0" netns="" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.517 [INFO][2898] k8s.go 585: Releasing IP address(es) ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.517 [INFO][2898] utils.go 188: Calico CNI releasing IP address ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.574 [INFO][2904] ipam_plugin.go 415: Releasing address using handleID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.574 [INFO][2904] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.574 [INFO][2904] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.587 [WARNING][2904] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.587 [INFO][2904] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" HandleID="k8s-pod-network.8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Workload="164.92.111.11-k8s-nginx--deployment--845c78c8b9--ndztm-eth0" Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.606 [INFO][2904] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:26.610627 env[1109]: 2024-02-12 19:42:26.608 [INFO][2898] k8s.go 591: Teardown processing complete. ContainerID="8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f" Feb 12 19:42:26.611600 env[1109]: time="2024-02-12T19:42:26.610673054Z" level=info msg="TearDown network for sandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" successfully" Feb 12 19:42:26.616195 env[1109]: time="2024-02-12T19:42:26.616124298Z" level=info msg="RemovePodSandbox \"8fdc690df0bd27d24914a19189da0a41c862609e4a7fa4b11e8e0d94dd98d22f\" returns successfully" Feb 12 19:42:26.885855 kubelet[1434]: E0212 19:42:26.884601 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:27.884980 kubelet[1434]: E0212 19:42:27.884905 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:28.578339 systemd[1]: run-containerd-runc-k8s.io-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902-runc.HhNwUb.mount: Deactivated successfully. Feb 12 19:42:28.713530 kubelet[1434]: E0212 19:42:28.713224 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:28.762294 env[1109]: time="2024-02-12T19:42:28.762217803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:28.770251 env[1109]: time="2024-02-12T19:42:28.770141778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:28.774134 env[1109]: time="2024-02-12T19:42:28.774059115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:28.777779 env[1109]: time="2024-02-12T19:42:28.777547855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:28.785108 env[1109]: time="2024-02-12T19:42:28.778721044Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 19:42:28.790516 env[1109]: time="2024-02-12T19:42:28.790443509Z" level=info msg="CreateContainer within sandbox \"f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:42:28.815424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3698432164.mount: Deactivated successfully. Feb 12 19:42:28.870986 env[1109]: time="2024-02-12T19:42:28.870461788Z" level=info msg="CreateContainer within sandbox \"f12718bfb0fb25436322186324eab3d437833d6615bf90f4e0f83f68ee3da2d9\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"76753ad0aafd25c947e3d97ed63f5f5a531e8c966f1f0dec40bd8c70d9e1e94d\"" Feb 12 19:42:28.871950 env[1109]: time="2024-02-12T19:42:28.871687036Z" level=info msg="StartContainer for \"76753ad0aafd25c947e3d97ed63f5f5a531e8c966f1f0dec40bd8c70d9e1e94d\"" Feb 12 19:42:28.886243 kubelet[1434]: E0212 19:42:28.886159 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:28.905179 systemd[1]: Started cri-containerd-76753ad0aafd25c947e3d97ed63f5f5a531e8c966f1f0dec40bd8c70d9e1e94d.scope. Feb 12 19:42:28.932941 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 12 19:42:28.936299 kernel: audit: type=1400 audit(1707766948.926:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.936377 kernel: audit: type=1400 audit(1707766948.926:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.936423 kernel: audit: type=1400 audit(1707766948.926:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.942391 kernel: audit: type=1400 audit(1707766948.926:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.942648 kernel: audit: type=1400 audit(1707766948.926:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.955691 kernel: audit: type=1400 audit(1707766948.926:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.955876 kernel: audit: type=1400 audit(1707766948.926:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.955916 kernel: audit: type=1400 audit(1707766948.926:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.956250 kernel: audit: type=1400 audit(1707766948.926:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.965078 kernel: audit: type=1400 audit(1707766948.935:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit: BPF prog-id=110 op=LOAD Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2766 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:28.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373533616430616166643235633934376533643937656436336635 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2766 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:28.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373533616430616166643235633934376533643937656436336635 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.935000 audit: BPF prog-id=111 op=LOAD Feb 12 19:42:28.935000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00029cd90 items=0 ppid=2766 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:28.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373533616430616166643235633934376533643937656436336635 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.938000 audit: BPF prog-id=112 op=LOAD Feb 12 19:42:28.938000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00029cdd8 items=0 ppid=2766 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:28.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373533616430616166643235633934376533643937656436336635 Feb 12 19:42:28.945000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:42:28.945000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:28.945000 audit: BPF prog-id=113 op=LOAD Feb 12 19:42:28.945000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00029d1e8 items=0 ppid=2766 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:28.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736373533616430616166643235633934376533643937656436336635 Feb 12 19:42:29.003331 env[1109]: time="2024-02-12T19:42:29.003270027Z" level=info msg="StartContainer for \"76753ad0aafd25c947e3d97ed63f5f5a531e8c966f1f0dec40bd8c70d9e1e94d\" returns successfully" Feb 12 19:42:29.073000 audit[2969]: AVC avc: denied { search } for pid=2969 comm="rpcbind" name="crypto" dev="proc" ino=22358 scontext=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:42:29.073000 audit[2969]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdd402a60c0 a2=0 a3=0 items=0 ppid=2951 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 key=(null) Feb 12 19:42:29.073000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:42:29.137000 audit[2974]: AVC avc: denied { search } for pid=2974 comm="dbus-daemon" name="crypto" dev="proc" ino=22358 scontext=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:42:29.137000 audit[2974]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4ae09150c0 a2=0 a3=0 items=0 ppid=2951 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 key=(null) Feb 12 19:42:29.137000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:42:29.141000 audit[2975]: AVC avc: denied { watch } for pid=2975 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538080 scontext=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c799,c804 tclass=dir permissive=0 Feb 12 19:42:29.141000 audit[2975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5625c3e3fd30 a2=2c8 a3=7ffc77542d6c items=0 ppid=2951 pid=2975 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 key=(null) Feb 12 19:42:29.141000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:42:29.152000 audit[2976]: AVC avc: denied { read } for pid=2976 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:42:29.152000 audit[2976]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f053d07e320 a1=80000 a2=d a3=7ffd3b67b920 items=0 ppid=2951 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 key=(null) Feb 12 19:42:29.152000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:42:29.154000 audit[2976]: AVC avc: denied { search } for pid=2976 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22358 scontext=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:42:29.154000 audit[2976]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f053c5d20c0 a2=0 a3=0 items=0 ppid=2951 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c799,c804 key=(null) Feb 12 19:42:29.154000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:42:29.568652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1039150827.mount: Deactivated successfully. Feb 12 19:42:29.636000 audit[3021]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.636000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffea1a170f0 a2=0 a3=7ffea1a170dc items=0 ppid=1582 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:29.643000 audit[3021]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.643000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffea1a170f0 a2=0 a3=7ffea1a170dc items=0 ppid=1582 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:29.886856 kubelet[1434]: E0212 19:42:29.886781 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:30.888086 kubelet[1434]: E0212 19:42:30.887988 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:31.890076 kubelet[1434]: E0212 19:42:31.889966 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:32.895433 kubelet[1434]: E0212 19:42:32.893912 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:33.895336 kubelet[1434]: E0212 19:42:33.895218 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:34.895940 kubelet[1434]: E0212 19:42:34.895852 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:35.896303 kubelet[1434]: E0212 19:42:35.896235 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:36.896873 kubelet[1434]: E0212 19:42:36.896780 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:37.898070 kubelet[1434]: E0212 19:42:37.897930 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:38.899657 kubelet[1434]: E0212 19:42:38.899589 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:39.134081 kubelet[1434]: I0212 19:42:39.134001 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=11.610623609 podCreationTimestamp="2024-02-12 19:42:20 +0000 UTC" firstStartedPulling="2024-02-12 19:42:21.263572663 +0000 UTC m=+56.165033274" lastFinishedPulling="2024-02-12 19:42:28.786890529 +0000 UTC m=+63.688351123" observedRunningTime="2024-02-12 19:42:29.586111189 +0000 UTC m=+64.487571801" watchObservedRunningTime="2024-02-12 19:42:39.133941458 +0000 UTC m=+74.035402082" Feb 12 19:42:39.134493 kubelet[1434]: I0212 19:42:39.134460 1434 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:42:39.155552 systemd[1]: Created slice kubepods-besteffort-pod67e68926_f1ac_4996_83a4_58544ec2f112.slice. Feb 12 19:42:39.305463 kubelet[1434]: I0212 19:42:39.305307 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xbd9f\" (UniqueName: \"kubernetes.io/projected/67e68926-f1ac-4996-83a4-58544ec2f112-kube-api-access-xbd9f\") pod \"test-pod-1\" (UID: \"67e68926-f1ac-4996-83a4-58544ec2f112\") " pod="default/test-pod-1" Feb 12 19:42:39.305840 kubelet[1434]: I0212 19:42:39.305799 1434 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d9ea9266-0ce8-4033-924a-143c0979d479\" (UniqueName: \"kubernetes.io/nfs/67e68926-f1ac-4996-83a4-58544ec2f112-pvc-d9ea9266-0ce8-4033-924a-143c0979d479\") pod \"test-pod-1\" (UID: \"67e68926-f1ac-4996-83a4-58544ec2f112\") " pod="default/test-pod-1" Feb 12 19:42:39.534899 kernel: Failed to create system directory netfs Feb 12 19:42:39.535128 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:42:39.535168 kernel: audit: type=1400 audit(1707766959.530:827): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.530000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.543930 kernel: Failed to create system directory netfs Feb 12 19:42:39.544152 kernel: audit: type=1400 audit(1707766959.530:827): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.530000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.555972 kernel: Failed to create system directory netfs Feb 12 19:42:39.556169 kernel: audit: type=1400 audit(1707766959.530:827): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.530000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.562393 kernel: Failed to create system directory netfs Feb 12 19:42:39.530000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.570082 kernel: audit: type=1400 audit(1707766959.530:827): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.530000 audit[3041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561597d175e0 a1=153bc a2=5615967c92b0 a3=5 items=0 ppid=9 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:39.530000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:42:39.586809 kernel: audit: type=1300 audit(1707766959.530:827): arch=c000003e syscall=175 success=yes exit=0 a0=561597d175e0 a1=153bc a2=5615967c92b0 a3=5 items=0 ppid=9 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:39.586950 kernel: audit: type=1327 audit(1707766959.530:827): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:42:39.596229 kernel: Failed to create system directory fscache Feb 12 19:42:39.597279 kernel: audit: type=1400 audit(1707766959.585:828): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.601541 kernel: Failed to create system directory fscache Feb 12 19:42:39.601656 kernel: audit: type=1400 audit(1707766959.585:828): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.609132 kernel: Failed to create system directory fscache Feb 12 19:42:39.609266 kernel: audit: type=1400 audit(1707766959.585:828): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.617257 kernel: Failed to create system directory fscache Feb 12 19:42:39.617391 kernel: audit: type=1400 audit(1707766959.585:828): avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.622314 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.627156 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.629456 kernel: Failed to create system directory fscache Feb 12 19:42:39.629569 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.630834 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.635269 kernel: Failed to create system directory fscache Feb 12 19:42:39.636405 kernel: Failed to create system directory fscache Feb 12 19:42:39.640330 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.656088 kernel: Failed to create system directory fscache Feb 12 19:42:39.656281 kernel: Failed to create system directory fscache Feb 12 19:42:39.585000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.659457 kernel: FS-Cache: Loaded Feb 12 19:42:39.585000 audit[3041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561597f2c9c0 a1=4c0fc a2=5615967c92b0 a3=5 items=0 ppid=9 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:39.585000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.742774 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.742885 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.745035 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.747220 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.747317 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.749126 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.750190 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.751232 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.753119 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.754605 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.755717 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.761596 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.762906 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.763939 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.766721 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.766825 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.767874 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.768846 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.772917 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.773860 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.774864 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.775930 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.776900 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.778662 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.781767 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.781854 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.783054 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.785506 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.785598 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.792292 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.792467 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.793574 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.793795 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.800106 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.800245 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.800445 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.801922 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.802010 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.802871 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.804857 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.804973 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.805798 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.806718 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.809348 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.812200 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.820087 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.820267 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.820305 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.820334 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.820364 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.820391 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.824099 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.824961 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.826966 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.827123 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.831460 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.832681 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.832807 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.840182 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.840354 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.840387 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.840414 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.840444 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.841863 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.841996 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.853089 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.853232 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.853349 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.853384 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.853424 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.853465 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.868438 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868660 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868724 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868755 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868782 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868812 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868839 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868865 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868890 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868916 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.868948 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.875805 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.876221 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.876289 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.877852 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.882194 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.882301 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.886653 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.887620 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.887662 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.890082 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.891377 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.891479 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.893465 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.898611 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.898671 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.898705 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.899407 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.900499 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.900739 kubelet[1434]: E0212 19:42:39.900422 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:39.902422 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.905490 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.906483 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.907416 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.917643 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.917832 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.917866 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.917899 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.917925 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.917953 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.920832 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.921170 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.921252 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.923117 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.923226 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.924150 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.928267 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.930215 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.930363 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.931216 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.933249 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.936598 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.944839 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.944999 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.945032 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.945069 kernel: Failed to create system directory sunrpc Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.694000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:39.964570 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:42:39.964897 kernel: RPC: Registered udp transport module. Feb 12 19:42:39.965025 kernel: RPC: Registered tcp transport module. Feb 12 19:42:39.965107 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:42:39.694000 audit[3041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561597f78ad0 a1=1588c4 a2=5615967c92b0 a3=5 items=6 ppid=9 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:39.694000 audit: CWD cwd="/" Feb 12 19:42:39.694000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PATH item=1 name=(null) inode=23883 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PATH item=2 name=(null) inode=23883 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PATH item=3 name=(null) inode=23884 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PATH item=4 name=(null) inode=23883 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PATH item=5 name=(null) inode=23885 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:39.694000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.140088 kernel: Failed to create system directory nfs Feb 12 19:42:40.140281 kernel: Failed to create system directory nfs Feb 12 19:42:40.140324 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.142285 kernel: Failed to create system directory nfs Feb 12 19:42:40.142399 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.143460 kernel: Failed to create system directory nfs Feb 12 19:42:40.143557 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.145480 kernel: Failed to create system directory nfs Feb 12 19:42:40.145537 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.147346 kernel: Failed to create system directory nfs Feb 12 19:42:40.147432 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.164258 kernel: Failed to create system directory nfs Feb 12 19:42:40.164435 kernel: Failed to create system directory nfs Feb 12 19:42:40.164467 kernel: Failed to create system directory nfs Feb 12 19:42:40.164496 kernel: Failed to create system directory nfs Feb 12 19:42:40.164522 kernel: Failed to create system directory nfs Feb 12 19:42:40.164548 kernel: Failed to create system directory nfs Feb 12 19:42:40.164579 kernel: Failed to create system directory nfs Feb 12 19:42:40.164608 kernel: Failed to create system directory nfs Feb 12 19:42:40.164634 kernel: Failed to create system directory nfs Feb 12 19:42:40.164672 kernel: Failed to create system directory nfs Feb 12 19:42:40.164698 kernel: Failed to create system directory nfs Feb 12 19:42:40.164723 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.165819 kernel: Failed to create system directory nfs Feb 12 19:42:40.165879 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.166700 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.168583 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.170324 kernel: Failed to create system directory nfs Feb 12 19:42:40.170418 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.172262 kernel: Failed to create system directory nfs Feb 12 19:42:40.172385 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.174118 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.178431 kernel: Failed to create system directory nfs Feb 12 19:42:40.178517 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.180322 kernel: Failed to create system directory nfs Feb 12 19:42:40.180525 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.186376 kernel: Failed to create system directory nfs Feb 12 19:42:40.186544 kernel: Failed to create system directory nfs Feb 12 19:42:40.186606 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.190110 kernel: Failed to create system directory nfs Feb 12 19:42:40.190254 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.194352 kernel: Failed to create system directory nfs Feb 12 19:42:40.194542 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.197361 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.198477 kernel: Failed to create system directory nfs Feb 12 19:42:40.198764 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.200818 kernel: Failed to create system directory nfs Feb 12 19:42:40.200960 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.220475 kernel: Failed to create system directory nfs Feb 12 19:42:40.220592 kernel: Failed to create system directory nfs Feb 12 19:42:40.220659 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.222405 kernel: Failed to create system directory nfs Feb 12 19:42:40.222503 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.224769 kernel: Failed to create system directory nfs Feb 12 19:42:40.224881 kernel: Failed to create system directory nfs Feb 12 19:42:40.224971 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.229171 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.238409 kernel: Failed to create system directory nfs Feb 12 19:42:40.238609 kernel: Failed to create system directory nfs Feb 12 19:42:40.076000 audit[3041]: AVC avc: denied { confidentiality } for pid=3041 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.271167 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:42:40.076000 audit[3041]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56159811b680 a1=e29dc a2=5615967c92b0 a3=5 items=0 ppid=9 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:40.076000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.382616 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.382780 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.384129 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.385364 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.386681 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.387843 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.389820 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.389941 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.391091 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.399825 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.400003 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.405623 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.405768 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.406799 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.408107 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.409397 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.410719 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.416933 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.417031 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.417105 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.417136 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.418938 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.419057 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.423880 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.424144 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.425911 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.426084 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.428373 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.428570 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.430298 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.433466 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.434912 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.435061 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.436123 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.437872 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.438007 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.439862 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.440168 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.441877 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.442008 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.442964 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.444185 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.445847 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.445936 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.464643 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.464810 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.464842 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.464903 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465752 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465789 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465818 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465854 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465878 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.465903 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.466784 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.469172 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.469361 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.471146 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.471269 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.492125 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492290 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492357 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492385 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492421 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492483 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492535 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492562 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492586 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492612 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492636 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.492661 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.494712 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.494831 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.500120 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.502152 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.502254 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.503116 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.507397 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.510313 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.510489 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.510525 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.512126 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.513205 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.515023 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.515185 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.516033 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.517987 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.518125 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.518920 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.519921 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.520886 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.521903 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.523138 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.348000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.525228 kernel: Failed to create system directory nfs4 Feb 12 19:42:40.866482 kernel: NFS: Registering the id_resolver key type Feb 12 19:42:40.866728 kernel: Key type id_resolver registered Feb 12 19:42:40.866781 kernel: Key type id_legacy registered Feb 12 19:42:40.348000 audit[3046]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb9ce31c010 a1=1d3cc4 a2=55b54abf52b0 a3=5 items=0 ppid=9 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:40.348000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.898349 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.898481 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.898510 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.899763 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.900294 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.901772 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.902005 kubelet[1434]: E0212 19:42:40.901665 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:40.902465 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.905107 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.908006 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.908747 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.909789 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.916193 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.916378 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.916417 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.916498 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.917436 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.918549 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.919284 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.924730 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.924919 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.925405 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.926506 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.927473 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.934946 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.935141 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.935183 kernel: Failed to create system directory rpcgss Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: AVC avc: denied { confidentiality } for pid=3047 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:42:40.886000 audit[3047]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f46078dc010 a1=4f524 a2=563bd55ce2b0 a3=5 items=0 ppid=9 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:40.886000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:42:41.904476 kubelet[1434]: E0212 19:42:41.902650 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:42.060274 kubelet[1434]: E0212 19:42:42.059859 1434 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:42.903438 kubelet[1434]: E0212 19:42:42.903373 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:43.905551 kubelet[1434]: E0212 19:42:43.905498 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:44.906549 kubelet[1434]: E0212 19:42:44.906471 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:45.781089 kubelet[1434]: E0212 19:42:45.781005 1434 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:45.907730 kubelet[1434]: E0212 19:42:45.907674 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:46.909452 kubelet[1434]: E0212 19:42:46.909355 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:47.170267 nfsidmap[3054]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-f-c9b648f98a' Feb 12 19:42:47.910840 kubelet[1434]: E0212 19:42:47.910488 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:48.911520 kubelet[1434]: E0212 19:42:48.911403 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:49.914917 kubelet[1434]: E0212 19:42:49.912066 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:50.915751 kubelet[1434]: E0212 19:42:50.915614 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:51.917532 kubelet[1434]: E0212 19:42:51.917202 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:52.918205 kubelet[1434]: E0212 19:42:52.918152 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:53.372539 nfsidmap[3057]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-f-c9b648f98a' Feb 12 19:42:53.413000 audit[1180]: AVC avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.421320 kernel: kauditd_printk_skb: 332 callbacks suppressed Feb 12 19:42:53.421507 kernel: audit: type=1400 audit(1707766973.413:833): avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.413000 audit[1180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.449206 kernel: audit: type=1300 audit(1707766973.413:833): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.449512 kernel: audit: type=1327 audit(1707766973.413:833): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.413000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.455104 kernel: audit: type=1400 audit(1707766973.413:834): avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.413000 audit[1180]: AVC avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.413000 audit[1180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.486568 kernel: audit: type=1300 audit(1707766973.413:834): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.486777 kernel: audit: type=1327 audit(1707766973.413:834): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.413000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.413000 audit[1180]: AVC avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.495275 kernel: audit: type=1400 audit(1707766973.413:835): avc: denied { watch_reads } for pid=1180 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.495456 kernel: audit: type=1300 audit(1707766973.413:835): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.413000 audit[1180]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a3dca649e0 a2=10 a3=e1d2065e5326e52a items=0 ppid=1 pid=1180 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.413000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.508871 kernel: audit: type=1327 audit(1707766973.413:835): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:42:53.509066 kernel: audit: type=1400 audit(1707766973.448:836): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.448000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.448000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.448000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:42:53.569609 env[1109]: time="2024-02-12T19:42:53.567647486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:67e68926-f1ac-4996-83a4-58544ec2f112,Namespace:default,Attempt:0,}" Feb 12 19:42:53.919241 kubelet[1434]: E0212 19:42:53.919163 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:53.982191 systemd-networkd[1010]: cali5ec59c6bf6e: Link UP Feb 12 19:42:53.992992 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:42:53.993441 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:42:53.991316 systemd-networkd[1010]: cali5ec59c6bf6e: Gained carrier Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.745 [INFO][3063] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {164.92.111.11-k8s-test--pod--1-eth0 default 67e68926-f1ac-4996-83a4-58544ec2f112 1316 0 2024-02-12 19:42:21 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 164.92.111.11 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.746 [INFO][3063] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.857 [INFO][3074] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" HandleID="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Workload="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.886 [INFO][3074] ipam_plugin.go 268: Auto assigning IP ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" HandleID="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Workload="164.92.111.11-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004ccf90), Attrs:map[string]string{"namespace":"default", "node":"164.92.111.11", "pod":"test-pod-1", "timestamp":"2024-02-12 19:42:53.857839026 +0000 UTC"}, Hostname:"164.92.111.11", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.886 [INFO][3074] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.886 [INFO][3074] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.886 [INFO][3074] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '164.92.111.11' Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.894 [INFO][3074] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.908 [INFO][3074] ipam.go 372: Looking up existing affinities for host host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.918 [INFO][3074] ipam.go 489: Trying affinity for 192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.924 [INFO][3074] ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.937 [INFO][3074] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.937 [INFO][3074] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.945 [INFO][3074] ipam.go 1682: Creating new handle: k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.955 [INFO][3074] ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.967 [INFO][3074] ipam.go 1216: Successfully claimed IPs: [192.168.97.132/26] block=192.168.97.128/26 handle="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.967 [INFO][3074] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.132/26] handle="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" host="164.92.111.11" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.967 [INFO][3074] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.967 [INFO][3074] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.97.132/26] IPv6=[] ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" HandleID="k8s-pod-network.ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Workload="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.970 [INFO][3063] k8s.go 385: Populated endpoint ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"67e68926-f1ac-4996-83a4-58544ec2f112", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:54.050300 env[1109]: 2024-02-12 19:42:53.970 [INFO][3063] k8s.go 386: Calico CNI using IPs: [192.168.97.132/32] ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.051942 env[1109]: 2024-02-12 19:42:53.970 [INFO][3063] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.051942 env[1109]: 2024-02-12 19:42:53.994 [INFO][3063] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.051942 env[1109]: 2024-02-12 19:42:53.996 [INFO][3063] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"164.92.111.11-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"67e68926-f1ac-4996-83a4-58544ec2f112", ResourceVersion:"1316", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 42, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"164.92.111.11", ContainerID:"ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ba:b9:9d:03:a4:cc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:42:54.051942 env[1109]: 2024-02-12 19:42:54.026 [INFO][3063] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="164.92.111.11-k8s-test--pod--1-eth0" Feb 12 19:42:54.141000 audit[3095]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:42:54.141000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7fffc21db0f0 a2=0 a3=7fffc21db0dc items=0 ppid=2135 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:42:54.168274 env[1109]: time="2024-02-12T19:42:54.167575454Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:42:54.168274 env[1109]: time="2024-02-12T19:42:54.167641576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:42:54.168274 env[1109]: time="2024-02-12T19:42:54.167658837Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:42:54.169224 env[1109]: time="2024-02-12T19:42:54.169095158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d pid=3102 runtime=io.containerd.runc.v2 Feb 12 19:42:54.252560 systemd[1]: Started cri-containerd-ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d.scope. Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.298000 audit: BPF prog-id=114 op=LOAD Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3102 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326365313939613036396630303866643434316631633363353039 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3102 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326365313939613036396630303866643434316631633363353039 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit: BPF prog-id=115 op=LOAD Feb 12 19:42:54.303000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039db60 items=0 ppid=3102 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326365313939613036396630303866643434316631633363353039 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.303000 audit: BPF prog-id=116 op=LOAD Feb 12 19:42:54.303000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039dba8 items=0 ppid=3102 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326365313939613036396630303866643434316631633363353039 Feb 12 19:42:54.304000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:42:54.304000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { perfmon } for pid=3113 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit[3113]: AVC avc: denied { bpf } for pid=3113 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:54.304000 audit: BPF prog-id=117 op=LOAD Feb 12 19:42:54.304000 audit[3113]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039dfb8 items=0 ppid=3102 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:54.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326365313939613036396630303866643434316631633363353039 Feb 12 19:42:54.418938 env[1109]: time="2024-02-12T19:42:54.418875907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:67e68926-f1ac-4996-83a4-58544ec2f112,Namespace:default,Attempt:0,} returns sandbox id \"ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d\"" Feb 12 19:42:54.427479 env[1109]: time="2024-02-12T19:42:54.427424151Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:42:54.919778 kubelet[1434]: E0212 19:42:54.919720 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:54.991404 env[1109]: time="2024-02-12T19:42:54.991332573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:55.013699 env[1109]: time="2024-02-12T19:42:55.013606060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:55.020661 env[1109]: time="2024-02-12T19:42:55.020582145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:55.027899 env[1109]: time="2024-02-12T19:42:55.027833888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:42:55.033807 env[1109]: time="2024-02-12T19:42:55.033736298Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:42:55.042631 env[1109]: time="2024-02-12T19:42:55.042413915Z" level=info msg="CreateContainer within sandbox \"ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:42:55.086485 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1795684160.mount: Deactivated successfully. Feb 12 19:42:55.123157 env[1109]: time="2024-02-12T19:42:55.121246342Z" level=info msg="CreateContainer within sandbox \"ab2ce199a069f008fd441f1c3c50956a531767ea8f6e37180719cb67598ded4d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"557624c525466bad4a06f5b23d549dc5419ff73100a330e5a186c957d24c3269\"" Feb 12 19:42:55.126623 env[1109]: time="2024-02-12T19:42:55.126556066Z" level=info msg="StartContainer for \"557624c525466bad4a06f5b23d549dc5419ff73100a330e5a186c957d24c3269\"" Feb 12 19:42:55.165745 systemd-networkd[1010]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:42:55.204597 systemd[1]: Started cri-containerd-557624c525466bad4a06f5b23d549dc5419ff73100a330e5a186c957d24c3269.scope. Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit: BPF prog-id=118 op=LOAD Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3102 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373632346335323534363662616434613036663562323364353439 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3102 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373632346335323534363662616434613036663562323364353439 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.246000 audit: BPF prog-id=119 op=LOAD Feb 12 19:42:55.246000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039c0d0 items=0 ppid=3102 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373632346335323534363662616434613036663562323364353439 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.252000 audit: BPF prog-id=120 op=LOAD Feb 12 19:42:55.252000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039c118 items=0 ppid=3102 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373632346335323534363662616434613036663562323364353439 Feb 12 19:42:55.255000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:42:55.255000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:55.255000 audit: BPF prog-id=121 op=LOAD Feb 12 19:42:55.255000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039c528 items=0 ppid=3102 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535373632346335323534363662616434613036663562323364353439 Feb 12 19:42:55.295588 env[1109]: time="2024-02-12T19:42:55.295504191Z" level=info msg="StartContainer for \"557624c525466bad4a06f5b23d549dc5419ff73100a330e5a186c957d24c3269\" returns successfully" Feb 12 19:42:55.713144 kubelet[1434]: I0212 19:42:55.713004 1434 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.104841717 podCreationTimestamp="2024-02-12 19:42:21 +0000 UTC" firstStartedPulling="2024-02-12 19:42:54.426406382 +0000 UTC m=+89.327866989" lastFinishedPulling="2024-02-12 19:42:55.034514626 +0000 UTC m=+89.935975226" observedRunningTime="2024-02-12 19:42:55.712153893 +0000 UTC m=+90.613614516" watchObservedRunningTime="2024-02-12 19:42:55.712949954 +0000 UTC m=+90.614410565" Feb 12 19:42:55.921250 kubelet[1434]: E0212 19:42:55.921161 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:56.923253 kubelet[1434]: E0212 19:42:56.922820 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:57.931565 kubelet[1434]: E0212 19:42:57.931507 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:58.575879 systemd[1]: run-containerd-runc-k8s.io-992252f4b6b3b93968145e58c84934ab75c9e6ca8c24e4f93f31b37d6682a902-runc.SPxZiJ.mount: Deactivated successfully. Feb 12 19:42:58.933189 kubelet[1434]: E0212 19:42:58.933122 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:42:59.933880 kubelet[1434]: E0212 19:42:59.933821 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:00.935294 kubelet[1434]: E0212 19:43:00.935230 1434 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"